International Research Publication House (IRPH)

Displaying 1-40 of 57 results

  • White Papers // Aug 2014

    Improvement of Ad hoc ON Demand Distance Vector (AODV) Routing Algorithm in Wireless Sensor Network (WSN)

    Wireless Sensor Networks (WSNs) are significant communications technology now-a-days in the world. New technologies grow rapidly in WSN areas, new emerging applications of WSN developed in many environments such as home automation, building automation and smart cities. One of WSN is IEEE 802.15.4 network. IEEE 802.15.4 network has many topology...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2014

    The RSA Challenge: Urge for Advent of Neoteric Encryption System

    RSA (Rivest Shamir Adleman) public-key encryption has protected privacy and verified authenticity when using computer, gadgets and web browsers around the globe. It is probably the most significant advance in the 3000 year history of cryptography. The reason behind its wide acceptance lies in computational security. However, 1024-bit encryption has...

    Provided By International Research Publication House (IRPH)

  • White Papers // Apr 2014

    Distributed Algorithm for Topology Control in Heterogeneous Ad-hoc Networks

    A mobile ad hoc network is a collection of wireless terminals that can be deployed rapidly. Its deficiencies include limited wireless bandwidth efficiency, low throughput, large delays, and weak security. Integrating it with a well established cellular network can improve communication and security in ad hoc networks, as well as...

    Provided By International Research Publication House (IRPH)

  • White Papers // Apr 2014

    A Dynamic Access Control Framework for Database Security

    In this paper, database systems have become mandatory for the organizations to implement. Database security is under great risk. Therefore, it is highly important to specify a role based and environment based dynamic access control model for the database system in organizations to ensure information security and be dynamic. It...

    Provided By International Research Publication House (IRPH)

  • White Papers // Mar 2014

    A GUI For Transformation Of Coordinate System

    The Global Positioning System (GPS) is a satellite based navigation system that can be used to locate positions anywhere on earth. It consists of satellites, control and monitor stations, and receivers. GPS receivers take information transmitted from the satellites and use triangulation to calculate a user's exact location. This proposed...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2014

    A Study on Issues Related to Software Dependability for Critical Embedded Systems

    As electronic grown, people's dependency increases on embedded devices. The area of applications of these embedded devices increases day-by-day. These embedded devices are controlled by some form of tiny operating systems specifically designed for controlling these new generations of devices controlling critical applications. Today, embedded systems are used in almost...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2014

    Power Gated Match Line Sensing Content Addressable Memory

    A Content-Addressable Memory (CAM) compares input search data against stored data, and returns the address of the matching data. CAM offers high-speed search function in a single clock cycle. In the conventional Content-Addressable Memory (CAM), equal power is consumed to determine if a stored word is matched to a search...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2014

    Design of MIMO OFDM SDM Systems for High Speed Data Transmission

    A combination of Multiple-Input Multiple-Output Spatial Division Multiplexing technology and Orthogonal Frequency Division Multiplexing technique, namely MIMO-OFDM SDM systems, been well-known as a potential technology to provide high speed data transmission and spectrum efficiency for modern wireless communications networks. The rising development of Internet related contents and demand of multimedia...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2013

    Investigating Methods for Appraising Software Complexity

    One way to start the quest for a model of software complexity is to examine the origins of the concept. Software complexity is widely regarded as an important determinant of software maintenance costs. Increased software complexity means that maintenance and enhancement projects will take longer, will cost more, and will...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2013

    A Software Process Improvement Model (SPIM)

    Software Process Improvement (SPI) is a systematic approach and continuous improvement of software producing organization's ability to produce and deliver quality software within time and budget constraints. In the course of this paper, the researcher developed, verified and validated such a model. This paper presents an approach to software process...

    Provided By International Research Publication House (IRPH)

  • White Papers // Nov 2013

    Issues and Techniques in Data Mining and Cluster Techniques

    In this paper, the authors show the issues to be faced in Data mining and various clustering Techniques. Clustering is being widely used in many application including medical, finance and etc. Clustering may be applied on database using various approaches, based upon distance, density, hierarchy, and partition. Data mining is...

    Provided By International Research Publication House (IRPH)

  • White Papers // Nov 2013

    An Efficient and Secure Key Management Protocol for Wireless Sensor Network

    The design of optimal key management technique which provides higher security with lower complexity and reduced communication overhead and storage requirements is one of the important challenges for the security of the wireless sensor networks. Although many key management protocols are already proposed like Localized Encryption and Authentication Protocol (LEAP),...

    Provided By International Research Publication House (IRPH)

  • White Papers // Nov 2013

    Finding Effective Software Security Metrics Using A Genetic Algorithm

    Quantifying the security of software is a research problem that has recently assumed tremendous significance. Various metrics have been and are being proposed for this purpose. It is always not clear as to what extent these metrics actually reveal the security of the software they are attempting to measure. Given...

    Provided By International Research Publication House (IRPH)

  • White Papers // Nov 2013

    Second Level Authentication Using QR Codes

    User authentication is one of the fundamental procedures to ensure secure communication and to share resources over an insecure public network channel. For this a simple and efficient authentication mechanism is required for securing a network system in the real environment. In general, a password-based authentication mechanism provides the basic...

    Provided By International Research Publication House (IRPH)

  • White Papers // Oct 2013

    Forms, Reports and Applications in DBMS: A Study

    Forms and reports are an important part of the database application. Decision makers and clerical workers use forms and reports often. Designers use them to create an integrated application .Users can perform their tasks easily by using forms and reports. Forms are used to collect data, display results of the...

    Provided By International Research Publication House (IRPH)

  • White Papers // Sep 2013

    Text Mining - Scope and Applications

    Text mining which is also known as data mining from textual unstructured databases refers to the process of extracting interesting and non-trivial patterns or knowledge from text i.e. may it be in any format. Unstructured text is very common, and in fact may represent the majority of information available to...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2013

    Non-Cryptography Authentication for Wireless Communications Based on Two Uncorrelated Attributes

    Recently in modern wireless systems, the physical-layer authentication has been proved to be a viable technique that can be combined with the higher-layer cryptographic to enhance the communication security. The existing physical-layer authentication schemes are single-variable based to verify transmitter's identity. In fact, these kinds of techniques are not quite...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jul 2013

    Optimization of AES Encryption Algorithm with S-Box

    In any wireless communication, security is crucial during data transmission. The encryption and decryption of data is the major challenge faced in the wireless communication for security of the data. These algorithms are used to ensure the security in the transmission channels. Similarly hardware utilization and power consumption are other...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2013

    Cluster Analysis on Statistical Data using Agglomerative Method

    The agglomerative method can be used to better understand the data and helping estimating the number of clusters and the starting seeds. The strength of the cluster analysis is that it will work well with numeric data. The agglomerative method leads to hierarchical clusters in which at each step the...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2013

    VoIP Systems Interface with the Conventional PSTN and Mobile Phones

    Corporate customer telephone support often use IP telephony exclusively to take advantage of the data abstraction. The benefit of using this technology is the need for only one class of circuit connection and better bandwidth use. Companies can acquire their own gateways to eliminate third-party costs, which is worthwhile in...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2013

    Exploiting Text Mining for Identifying Novel Information

    Data mining is typically concerned with the detection of patterns in numeric data, but very often important (e.g., critical to business) information is stored in the form of text. Unlike numeric data, text is often amorphous, and difficult to deal with. Text mining generally consists of the analysis of (multiple)...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2013

    An Unsupervised Technique for Statistical Data Analysis Using Data Mining

    Cluster analysis divides data into meaningful or useful groups (clusters). If meaningful clusters are the goal, then the resulting clusters should capture the \"Natural\" structure of the data. For example, cluster analysis can be used to group related documents for browsing, to find genes and proteins that have similar functionality,...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2013

    Single-Keyword Pattern Matching Algorithms for Network Intrusion Detection System

    The Network Intrusion Detection System (NIDS) is an important part of any modern network. One of the important processes in NIDS is inspecting of individuals' packets in network traffic, deciding if these packets are infected with any malicious activities. This process, which is called content matching, is done via string...

    Provided By International Research Publication House (IRPH)

  • White Papers // Feb 2013

    Adaptive Anomaly Detection for Network Security

    Intrusion detection is an integral part of computer security. It improves the security of information systems by allowing the review of patterns of access in order to discover abnormal activity of users and serving as a deterrent to users attempts to bypass system privilege or protection mechanisms. Anomaly detection systems,...

    Provided By International Research Publication House (IRPH)

  • White Papers // Feb 2013

    Route Stability in WiMAX (802.16)

    It is claimed that WiMAX provides a perfect opportunity for an alternative network development. Discussion is based on five main aspects of WiMAX network implementation. Establishment and development of Base Stations (BS), Access Service Network Gateway (ASNG), and Connectivity Service Network (CSN), Base Station Controllers (BSC) and an Analogous Option...

    Provided By International Research Publication House (IRPH)

  • White Papers // Feb 2013

    An Adaptive Recognition Technique Named SOMPF Based on Palmprint and Face Using Neural Network Based Self Organizing Maps

    Biometrics has been gaining attraction due to the ever-growing demand of this field of research on access control, public security, forensics and e-banking. However, there are still many challenging problems in improving the accuracy, robustness, efficiency, and user-friendliness of these biometric systems. In this paper, the authors propose a new...

    Provided By International Research Publication House (IRPH)

  • White Papers // Sep 2012

    A Naive Approach for Managing Virtualized Resources and Optimistic Cost

    Cloud computing has drawn much attention in recent years. One of its delivery models, called Infrastructure-as-a-Service (IaaS), provides users with infrastructure services such as computation and data storage, heavily dependent upon virtualization techniques that offer benefits such as elasticity and cost efficiency. The cloud computing service provider's ultimate goal is...

    Provided By International Research Publication House (IRPH)

  • White Papers // Sep 2012

    Energy Efficient Resource Management Using Green Virtualisation Cluster Computing

    Normally cluster computing are exhibiting the greatest rate in growth of any class of parallel computer and may dominate high performance computing in the near future parallel processing and parallel computer architecture is a field with decades of experience that clearly demonstrates the critical factors of interconnect latency and bandwidth,...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2012

    Efficient Monitoring of Intrusion Detection in Mobile Ad-Hoc Network Using Monitoring Based Approach

    It is well known that Mobile Ad-hoc NETworks (MANETs) are susceptible to numerous attacks. Communication is done in the absence of fixed infrastructure by seeking the help of the intermediate nodes. In such, malicious intermediate nodes can be a threat to the security of conversation between the mobile nodes. Security...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2012

    Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

    In this paper, the authors elect leader (cluster head) from clusters in the presence of selfish node to serve as the IDS for the entire cluster and to balance the resource consumption among all nodes and prolong the lifetime of an MANET. A mechanism design theory called VCG (Vickrey, Clarke,...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jul 2012

    Performance Analysis of MIMO with Amplify and Forward Relay Network for Mobile to Mobile Fading Channel Model

    Wireless relaying is essential to provide reliable transmission, high throughput and broad coverage for wireless networks in a variety of applications. In a cellular environment a relay can be used to overcome shadowing effect due to obstacles. In wireless communication, multiple-antenna systems provide higher rate data transmission than a single-antenna...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jul 2012

    Compare Various Routing Securities Strategies of Wireless Networks

    Wireless technology has been very popular now-a-days. This is because of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jul 2012

    A Distributed CSMA Algorithm for Maximizing Throughput in Wireless Networks

    In multihop wireless networks, designing distributed scheduling algorithms to achieve the maximal throughput is a challenging problem because of the complex interference constraints among different links. Traditional Maximal Weight Scheduling (MWS), although throughput-optimal, is difficult to implement in distributed networks. On the other hand, a distributed greedy protocol similar to...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2012

    Comparison of DSR and Weight Based Reliable Routing in MANET

    Mobile Ad hoc NETworks (MANET) consist of a set of mobile hosts that can communicate with each other without the assistance of base stations. MANETs are heterogeneous mix of different wireless and mobile devices, ranging from little hand-held devices to laptops. In MANETs, the high mobility of mobile nodes is...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2012

    Support-Vector-Based Fuzzy Neural Networks

    In this paper, novel Fuzzy Neural Networks (FNNs) combining with support vector learning mechanism called Support-Vector-based Fuzzy Neural Networks (SVFNNs) are proposed for pattern classification and function approximation. The SVFNNs combine the capability of minimizing the empirical risk (training error) and expected risk (testing error) of support vector learning in...

    Provided By International Research Publication House (IRPH)

  • White Papers // Apr 2012

    Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Adhoc Network

    Mobile ad-hoc network are able work without any existing infrastructure. MANET is a self configure network connected by wireless links. Mobile adhoc network uses temporary network which is able to work without any centralize administration or stand alone infrastructure. In mobile ad-hoc network each device move in any direction without...

    Provided By International Research Publication House (IRPH)

  • White Papers // Mar 2012

    Materialized Views for Data Selection in Dataware House

    A Data Warehouse (DW) is a repository of information retrieved from multiple, possibly heterogeneous, autonomous, distributed database and other information sources for the purpose of complex querying, analysis, and decision support. Data in the DW are selectively collected from the sources, processed in order to resolve inconsistencies, and integrated advance...

    Provided By International Research Publication House (IRPH)

  • White Papers // Mar 2012

    Analysis for Intrusion Detection in Wireless Ad-Hoc Networks

    As Mobile Ad-hoc NETwork (MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a central role in the data analysis process. The proposed features are tested in deferent network operating conditions. PCA is used to...

    Provided By International Research Publication House (IRPH)

  • White Papers // Feb 2012

    A Multidimensional Model for Automatic Schema Generation process by Integrating OLAP with Data Mining Systems

    Data in a data warehouse is organized in a multidimensional model. This multidimensional model helps in faster query processing and efficient OLAP operations for data analysis and decision making. In this paper, the authors introduce a framework which proposes design methodologies to map the relational database into a multidimensional model....

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2012

    Devise of a More Consistent and Secure Network with Multi-Homed Virtual Private Network

    Many enterprises are constantly looking for \"Best solutions\" to devise more consistent and more secure networks at affordable costs. In this paper, the authors present their solution that can achieve the above goals by supporting Virtual Private Networks (VPN) over multi-homed networks. While the conventional VPN technology offers a cost-effective...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2011

    Web-controlled Embedded System using Mobile

    The wireless communication is widely used in embedded system. The automation required for long distance control of the system enables to make application based on wireless communication. In this paper, an application of wireless communication is done for a long distance control of electrical appliances via a mobile phone by...

    Provided By International Research Publication House (IRPH)

  • White Papers // Sep 2012

    Energy Efficient Resource Management Using Green Virtualisation Cluster Computing

    Normally cluster computing are exhibiting the greatest rate in growth of any class of parallel computer and may dominate high performance computing in the near future parallel processing and parallel computer architecture is a field with decades of experience that clearly demonstrates the critical factors of interconnect latency and bandwidth,...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2010

    Visual Cryptography for Authentication Using CAPTCHA

    Authenticity of the user is the major issue in today's internet applications such as core banking. Password has been the most used authentication mechanism which is subjected to offline and online dictionary attacks. Today hacking of the databases on the internet is unavoidable. It is difficult to trust the information...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2011

    Intelligent Knowledge Based Heterogeneous Database Using OGSA-Dai Architecture

    In this paper, the authors present a framework to manage the distributed and heterogeneous databases in grid environment Using Open Grid Services Architecture - Data Access and Integration (ODSA-DAI). Even though there is a lot of improvement in database technology, connecting heterogeneous databases within a single application challenging task. Maintaining...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2011

    An Efficient Data Cleaning Algorithm Through Minimum Spanning Tree for Data Mining

    Detecting outliers in database (as unusual objects) using Minimum Spanning Tree is a big desire. It is an important task in wide variety of application areas. In this paper, the authors propose Minimum Spanning Tree (MST) based algorithm for detecting outliers. The outliers are detected in the data set based...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2011

    Cyber Attack Detection and Classification Using Parallel Support Vector Machine

    Cyber attack is becoming a critical issue of organizational information systems. A number of cyber attack detection and classification methods have been introduced with different levels of success that is used as a countermeasure to preserve data integrity and system availability from attacks. The classification of attacks against computer network...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2011

    Study and Analysis for Genetic and Guassian Phishing Detect ion Method

    In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. EBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging, and...

    Provided By International Research Publication House (IRPH)

  • White Papers // Feb 2013

    An Adaptive Recognition Technique Named SOMPF Based on Palmprint and Face Using Neural Network Based Self Organizing Maps

    Biometrics has been gaining attraction due to the ever-growing demand of this field of research on access control, public security, forensics and e-banking. However, there are still many challenging problems in improving the accuracy, robustness, efficiency, and user-friendliness of these biometric systems. In this paper, the authors propose a new...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2013

    Single-Keyword Pattern Matching Algorithms for Network Intrusion Detection System

    The Network Intrusion Detection System (NIDS) is an important part of any modern network. One of the important processes in NIDS is inspecting of individuals' packets in network traffic, deciding if these packets are infected with any malicious activities. This process, which is called content matching, is done via string...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2011

    Analysis of Various Types of Viruses and Their Remedies

    The recent proliferation of malicious code that spreads with virus code exacerbates the problem. In this paper, the authors present a general overview on evolution of virus, malwares and defensive employed by advanced anti-virus techniques. Computer viruses gradually improve codes to make them invisible. Anti-virus technologies continually follow the tricks...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jul 2013

    Optimization of AES Encryption Algorithm with S-Box

    In any wireless communication, security is crucial during data transmission. The encryption and decryption of data is the major challenge faced in the wireless communication for security of the data. These algorithms are used to ensure the security in the transmission channels. Similarly hardware utilization and power consumption are other...

    Provided By International Research Publication House (IRPH)

  • White Papers // Sep 2012

    A Naive Approach for Managing Virtualized Resources and Optimistic Cost

    Cloud computing has drawn much attention in recent years. One of its delivery models, called Infrastructure-as-a-Service (IaaS), provides users with infrastructure services such as computation and data storage, heavily dependent upon virtualization techniques that offer benefits such as elasticity and cost efficiency. The cloud computing service provider's ultimate goal is...

    Provided By International Research Publication House (IRPH)

  • White Papers // Mar 2012

    Analysis for Intrusion Detection in Wireless Ad-Hoc Networks

    As Mobile Ad-hoc NETwork (MANET) has become a very important technology, research concerning its security problem, especially, in intrusion detection has attracted many researchers. Feature selection methodology plays a central role in the data analysis process. The proposed features are tested in deferent network operating conditions. PCA is used to...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2013

    Non-Cryptography Authentication for Wireless Communications Based on Two Uncorrelated Attributes

    Recently in modern wireless systems, the physical-layer authentication has been proved to be a viable technique that can be combined with the higher-layer cryptographic to enhance the communication security. The existing physical-layer authentication schemes are single-variable based to verify transmitter's identity. In fact, these kinds of techniques are not quite...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2011

    Achieving Concurrent Information Security Through Monadic Control Technique of Effects

    In this paper, the controlling information flow and maintaining integrity via monadic encapsulation of effects. This paper is constructive, relying on properties of monads and monad transformers to build, verify, and extend secure software systems. The authors illustrate this approach by construction of abstract operating systems called separation kernels. Starting...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2012

    Efficient Monitoring of Intrusion Detection in Mobile Ad-Hoc Network Using Monitoring Based Approach

    It is well known that Mobile Ad-hoc NETworks (MANETs) are susceptible to numerous attacks. Communication is done in the absence of fixed infrastructure by seeking the help of the intermediate nodes. In such, malicious intermediate nodes can be a threat to the security of conversation between the mobile nodes. Security...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2012

    Devise of a More Consistent and Secure Network with Multi-Homed Virtual Private Network

    Many enterprises are constantly looking for \"Best solutions\" to devise more consistent and more secure networks at affordable costs. In this paper, the authors present their solution that can achieve the above goals by supporting Virtual Private Networks (VPN) over multi-homed networks. While the conventional VPN technology offers a cost-effective...

    Provided By International Research Publication House (IRPH)

  • White Papers // Nov 2013

    Finding Effective Software Security Metrics Using A Genetic Algorithm

    Quantifying the security of software is a research problem that has recently assumed tremendous significance. Various metrics have been and are being proposed for this purpose. It is always not clear as to what extent these metrics actually reveal the security of the software they are attempting to measure. Given...

    Provided By International Research Publication House (IRPH)

  • White Papers // Feb 2013

    Adaptive Anomaly Detection for Network Security

    Intrusion detection is an integral part of computer security. It improves the security of information systems by allowing the review of patterns of access in order to discover abnormal activity of users and serving as a deterrent to users attempts to bypass system privilege or protection mechanisms. Anomaly detection systems,...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2011

    Analysis of Framework and Security Issues in Android

    Mobile internet is the wireless internet services that can be accessed using handled devices such as mobile phones. Mobile internet can be classified as limited and unlimited based on the service subscribers have to pay on download packet basis for the internet service where as in unlimited mobile internet services...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2011

    SBPGP Security Based Model in Large Scale Manets

    The requirement of today is to provide secure and reliable communication of MANETs. So there is need for Key management and authentication is the central aspects of providing security in MANETs so these should not be weak. Security has no much issue for a small network but when number of...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2014

    A Study on Issues Related to Software Dependability for Critical Embedded Systems

    As electronic grown, people's dependency increases on embedded devices. The area of applications of these embedded devices increases day-by-day. These embedded devices are controlled by some form of tiny operating systems specifically designed for controlling these new generations of devices controlling critical applications. Today, embedded systems are used in almost...

    Provided By International Research Publication House (IRPH)

  • White Papers // Apr 2014

    A Dynamic Access Control Framework for Database Security

    In this paper, database systems have become mandatory for the organizations to implement. Database security is under great risk. Therefore, it is highly important to specify a role based and environment based dynamic access control model for the database system in organizations to ensure information security and be dynamic. It...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2014

    Power Gated Match Line Sensing Content Addressable Memory

    A Content-Addressable Memory (CAM) compares input search data against stored data, and returns the address of the matching data. CAM offers high-speed search function in a single clock cycle. In the conventional Content-Addressable Memory (CAM), equal power is consumed to determine if a stored word is matched to a search...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2013

    An Unsupervised Technique for Statistical Data Analysis Using Data Mining

    Cluster analysis divides data into meaningful or useful groups (clusters). If meaningful clusters are the goal, then the resulting clusters should capture the \"Natural\" structure of the data. For example, cluster analysis can be used to group related documents for browsing, to find genes and proteins that have similar functionality,...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2013

    Cluster Analysis on Statistical Data using Agglomerative Method

    The agglomerative method can be used to better understand the data and helping estimating the number of clusters and the starting seeds. The strength of the cluster analysis is that it will work well with numeric data. The agglomerative method leads to hierarchical clusters in which at each step the...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jun 2013

    Exploiting Text Mining for Identifying Novel Information

    Data mining is typically concerned with the detection of patterns in numeric data, but very often important (e.g., critical to business) information is stored in the form of text. Unlike numeric data, text is often amorphous, and difficult to deal with. Text mining generally consists of the analysis of (multiple)...

    Provided By International Research Publication House (IRPH)

  • White Papers // Sep 2013

    Text Mining - Scope and Applications

    Text mining which is also known as data mining from textual unstructured databases refers to the process of extracting interesting and non-trivial patterns or knowledge from text i.e. may it be in any format. Unstructured text is very common, and in fact may represent the majority of information available to...

    Provided By International Research Publication House (IRPH)

  • White Papers // Nov 2013

    Issues and Techniques in Data Mining and Cluster Techniques

    In this paper, the authors show the issues to be faced in Data mining and various clustering Techniques. Clustering is being widely used in many application including medical, finance and etc. Clustering may be applied on database using various approaches, based upon distance, density, hierarchy, and partition. Data mining is...

    Provided By International Research Publication House (IRPH)

  • White Papers // Apr 2014

    Distributed Algorithm for Topology Control in Heterogeneous Ad-hoc Networks

    A mobile ad hoc network is a collection of wireless terminals that can be deployed rapidly. Its deficiencies include limited wireless bandwidth efficiency, low throughput, large delays, and weak security. Integrating it with a well established cellular network can improve communication and security in ad hoc networks, as well as...

    Provided By International Research Publication House (IRPH)

  • White Papers // May 2012

    Support-Vector-Based Fuzzy Neural Networks

    In this paper, novel Fuzzy Neural Networks (FNNs) combining with support vector learning mechanism called Support-Vector-based Fuzzy Neural Networks (SVFNNs) are proposed for pattern classification and function approximation. The SVFNNs combine the capability of minimizing the empirical risk (training error) and expected risk (testing error) of support vector learning in...

    Provided By International Research Publication House (IRPH)

  • White Papers // Nov 2011

    Review of Computer Aided Design (CAD) Data Transformation in Rapid Prototyping Technology

    Manufacturing of any product involves not only in design and material selection but also selection of appropriate manufacturing process required to obtain the desire shape and properties of the product. Prototyping is a process of structure pre-production models of a product to test various aspects of its design. Rapid Prototyping...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2013

    Investigating Methods for Appraising Software Complexity

    One way to start the quest for a model of software complexity is to examine the origins of the concept. Software complexity is widely regarded as an important determinant of software maintenance costs. Increased software complexity means that maintenance and enhancement projects will take longer, will cost more, and will...

    Provided By International Research Publication House (IRPH)

  • White Papers // Dec 2013

    A Software Process Improvement Model (SPIM)

    Software Process Improvement (SPI) is a systematic approach and continuous improvement of software producing organization's ability to produce and deliver quality software within time and budget constraints. In the course of this paper, the researcher developed, verified and validated such a model. This paper presents an approach to software process...

    Provided By International Research Publication House (IRPH)

  • White Papers // Mar 2014

    A GUI For Transformation Of Coordinate System

    The Global Positioning System (GPS) is a satellite based navigation system that can be used to locate positions anywhere on earth. It consists of satellites, control and monitor stations, and receivers. GPS receivers take information transmitted from the satellites and use triangulation to calculate a user's exact location. This proposed...

    Provided By International Research Publication House (IRPH)

  • White Papers // Aug 2012

    Using VCG based Designing and Electing Secure Leader Model for Intrusion Detection System in Manet

    In this paper, the authors elect leader (cluster head) from clusters in the presence of selfish node to serve as the IDS for the entire cluster and to balance the resource consumption among all nodes and prolong the lifetime of an MANET. A mechanism design theory called VCG (Vickrey, Clarke,...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jul 2012

    Performance Analysis of MIMO with Amplify and Forward Relay Network for Mobile to Mobile Fading Channel Model

    Wireless relaying is essential to provide reliable transmission, high throughput and broad coverage for wireless networks in a variety of applications. In a cellular environment a relay can be used to overcome shadowing effect due to obstacles. In wireless communication, multiple-antenna systems provide higher rate data transmission than a single-antenna...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jul 2012

    Compare Various Routing Securities Strategies of Wireless Networks

    Wireless technology has been very popular now-a-days. This is because of a standard depends on the ease of use and level of security it provides. In this case, contrast between wireless usage and security standards show that the security is not keeping up with the growth paste of end user's...

    Provided By International Research Publication House (IRPH)

  • White Papers // Feb 2013

    Route Stability in WiMAX (802.16)

    It is claimed that WiMAX provides a perfect opportunity for an alternative network development. Discussion is based on five main aspects of WiMAX network implementation. Establishment and development of Base Stations (BS), Access Service Network Gateway (ASNG), and Connectivity Service Network (CSN), Base Station Controllers (BSC) and an Analogous Option...

    Provided By International Research Publication House (IRPH)

  • White Papers // Jan 2014

    Design of MIMO OFDM SDM Systems for High Speed Data Transmission

    A combination of Multiple-Input Multiple-Output Spatial Division Multiplexing technology and Orthogonal Frequency Division Multiplexing technique, namely MIMO-OFDM SDM systems, been well-known as a potential technology to provide high speed data transmission and spectrum efficiency for modern wireless communications networks. The rising development of Internet related contents and demand of multimedia...

    Provided By International Research Publication House (IRPH)