International Scientific Research Organization for Science, Engineering and Technology

Displaying 1-31 of 31 results

  • White Papers // Dec 2013

    Study of Services and Privacy Usage in Cloud Computing

    In last decade, there are several survey point out over privacy and services has risen and increasingly becoming central point for IT industries. Almost every day, IT sector, network security and sensitive data are being broken. This uses more advanced techniques to protect their information. Privacy is a very essential...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Dec 2013

    Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution

    The word cloud (also phrased as \"The cloud\") is used as a metaphor for \"The Internet\", so the phrase cloud computing means \"A type of Internet-based computing\", where different services - such as servers, storage and applications - - are delivered to an organization's computers and devices through the Internet....

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Dec 2013

    Challenging Issues of a Context-Aware Mobile Computing Framework

    Context-aware mobile technology has garnered lot of attention in recent times. Context-aware applications are self-regulating and self-monitoring. Building a context-awareness framework is a serious challenge. This paper presents an idea for the development of a context-aware mobile framework. The process of proposing such a framework is quite a challenging task...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    Architecture for Network-Intrusion Detection and Response in Open Networks Using Analyzer Mobile Agents

    In this paper, the authors describe the implementation of distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional Intrusion Detection Systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based agents. These security agents monitor multiple levels like packet, process,...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. Security is an essential requirement in MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing

    Cloud computing is the latest trend of today's IT industries. It is the solution for the problem that occurs due to the resources availability and its utilization over the network. The popularity of cloud computing has increased due to its great policy of pay-as-you-use or resource-on-demand but still it lacks...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    A Comparative Study of Security Issues& Challenges of Cloud Computing

    Cloud computing is rapidly changing the whole scenario of distributed system and it has given a fresh meaning to distributed system. Although cloud computing is delivering essential services and benefits such as low price services, on demand self-service, broad network access, large scale computation and highly availability of resources, but...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Aug 2013

    Data Dependencies Mining In Database by Removing Equivalent Attributes

    Database design methodology normally starts with the first step of conceptual schema design in which users' requirements are modeled as the Entity Relationship (ER) diagram. The next step of logical design focuses on the translation of conceptual schemas into relations or database tables. Data dependency plays a key role in...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Aug 2013

    Convergence of IT and Data Mining with Other Technologies

    In this age of technology and communication convergence, the user cannot help but be impacted by technologies and innovations that center on computers. This paper examines the growing need for a secure environment and a general-purpose analytics engine. The process need for secure environment is physical or It security and...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jul 2013

    Information Leakage Through Social Networking Websites Leads to Lack of Privacy and Identity Theft Security Issues

    Social Networking Websites (SNW) such as Facebook, Orkut and Twitter etc., have gained more attractiveness in recent days. Because of its large number of usage, and large amount of information, they become a potential network for malicious users or attackers to exploit. Most of the social networking websites try to...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network

    To achieve security in wireless sensor networks it is important to be able to encrypt the messages sent among the sensor nodes. Keys for encryption and authentication purpose must be agreed upon by communicating nodes. Due to the resource constraint (limited memory size); achieving such key agreement in wireless sensor...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    A Survey: Preventing Discovering Association Rules for Large Data Base

    Data products are designed to inform public or business policy, and research or public information. Securing these products against unauthorized accesses has been a long-term goal of the database security research community and the government statistical agencies. Whether data is personal or corporate data, data mining offers the potential to...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Mining Frequent Pattern from Large Dynamic Database Using Compacting Data Sets

    Frequent pattern mining has been a focused theme in data mining research and the first step in the analysis of data rising in a broad range of applications. Apriori based algorithms have used candidate itemsets generation method, but this approach was highly time-consuming. Several research works have been carried out...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Comparative Based Study of Scheduling Algorithms for Resource Management in Cloud Computing Environment

    Cloud Computing (CC) is emerging as the next generation platform which would facilitate the user on pay as the user use mode as per requirement. It provides a number of benefits which could not otherwise be realized. The primary aim of CC is to provide efficient access to remote and...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    An Improved Authentication Technique with OTP in Cloud Computing

    Today data security plays an important role in the field of software and quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. Cloud computing is a capable technology to make easy development of large-scale,...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Securing the Cloud Environment Using OTP

    In today's scenario, websites have been converted from just a display of information into an online transaction in the form of goods, services, or money. Along with development, the security of the website is also need to be tightened, not just rely on usernames and passwords but also to the...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Door Lock System through Face Recognition Using MATLAB

    Face recognition is a biometric technology with a wide range of potential applications such as access control, banking, information security, human computer interaction, virtual reality, database retrieval etc. This paper addresses the building of face recognition system by using Principal Component Analysis (PCA) method. PCA is a statistical approach used...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Design & Analysis of Micro Strip Patch Antenna

    Micro strip antenna is most common small sized antenna in which a metal patch is deposited on dielectric material. Micro strip patch antennas have been an attractive choice in mobile and radio wireless communication. They have advantages such as low profile, low cost and robust. However, at the same time...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Networks

    In wireless sensor networks the deployment of nodes is an important factor that affects all the aspects of system like coverage, connectivity, bandwidth, packet loss and lifetime of network. In this paper, the authors propose a new clustering technique for enhanced lifetime of the network in deterministic deployment of the...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Clustering the Nodes With Trust Value Using Iterative Process of Watchdog Mechanism in Networks

    DTN (Delay/Distribution Tolerant Networks) is important field in wireless communication and network security which is emerging as vehicular, planetaryin planetary, underwater and satellite networks. Finally they say it as end-to-end communication latency and the lack of end-to-end path from source to destination. So these characters have several challenges to the...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    A Novel Security Based Model for Wireless Mesh Networks

    Wireless Mesh Network (WMN) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. WMN has the feather of self-organization, distributed structure. WMN is going to address the internet provision to users at low cost anytime from anywhere, as it allows a fast, easy and...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Secured Position Based Grid Location Service for MANET Using SGF

    Position based routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Correctness of location messages. These routing protocols use geographical information to make forwarding decisions, resulting in a significant reduction in the number of routing messages. However, current position aided routing protocols were not designed...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Adaptive Load Balancing in DSR

    A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services regularly available in wide-area networks to which the hosts may normally be connected. In this paper, the authors present an effective scheme to...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Client Server Network Management System for WLAN (Wi-Fi) With Remote Monitoring

    Network management Systems have played a great important role in information systems. There are different network management systems such as remote monitoring, desktop sharing, bandwidth management etc. This paper elaborates the above mentioned issues i.e., remote desktop sharing, bandwidth management and Remote monitoring which are accumulated in single network management...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Crossbar Switch for Network Processor Application

    A network processor is an integrated circuit, with a feature set designed to tackle the needs of the networking application domain. Typically NPs are software programmable and have generic functions, which are similar to general purpose central processing units, commonly used in many different products. Due to the fact that...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    A Comparison Study for PSD Performance in OFDM Systems Based on Using Autocorrelation Techniques

    Cooperative wireless communication relay networks in OFDM-based systems have been shown to improve performance in various systems using digital modulation techniques as a form of spatial diversity, OFDM, a multicarrier modulation technique, is widely adopted because of its many advantages. Most of the time, in-band spectrum of the multicarrier signal...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Linear PWM Strategy for SMPS

    A switched-mode power supply (Switching-Mode Power Supply or SMPS) is an electronic Power supply incorporates a switching regulator in order to be highly efficient in the conversion of electrical power. In SMPS using PWM chip, It requires hyperbolic curve of nonlinear nature of Input voltage & on time for smooth...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Security and Privacy in Biometrics: A Review

    The term "Biometrics" is derived from the Greek words bio (life) and metric (to measure).It refers to the automated recognition of individuals based on their physiological or behavioural traits like fingerprints, hand geometry, face, iris recognition, signature, voice and many more. By using biometrics it is possible to confirm or...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Feb 2013

    Comparison of Intel Single-Core and Intel Dual-Core Processor Performance

    Computer system performance and evaluation deal with investigation of computer components (both hardware and software) with a view of establishing the level of their performances. This paper, carry out performance evaluation studies on Intel single-core and dual-core process to know which of the processor have better execution time and throughput....

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Feb 2013

    Security Enhancement in Cloud Computing (CC)

    Cloud Computing (CC) is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. CC is becoming one of the most important areas in the information technology world. Several...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Feb 2013

    Study of Threats, Risk and Challenges in Cloud Computing

    Cloud computing security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this paper, the authors present security issues that fetch...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    Architecture for Network-Intrusion Detection and Response in Open Networks Using Analyzer Mobile Agents

    In this paper, the authors describe the implementation of distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional Intrusion Detection Systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based agents. These security agents monitor multiple levels like packet, process,...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network

    To achieve security in wireless sensor networks it is important to be able to encrypt the messages sent among the sensor nodes. Keys for encryption and authentication purpose must be agreed upon by communicating nodes. Due to the resource constraint (limited memory size); achieving such key agreement in wireless sensor...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    A Survey: Preventing Discovering Association Rules for Large Data Base

    Data products are designed to inform public or business policy, and research or public information. Securing these products against unauthorized accesses has been a long-term goal of the database security research community and the government statistical agencies. Whether data is personal or corporate data, data mining offers the potential to...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Mining Frequent Pattern from Large Dynamic Database Using Compacting Data Sets

    Frequent pattern mining has been a focused theme in data mining research and the first step in the analysis of data rising in a broad range of applications. Apriori based algorithms have used candidate itemsets generation method, but this approach was highly time-consuming. Several research works have been carried out...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Aug 2013

    Data Dependencies Mining In Database by Removing Equivalent Attributes

    Database design methodology normally starts with the first step of conceptual schema design in which users' requirements are modeled as the Entity Relationship (ER) diagram. The next step of logical design focuses on the translation of conceptual schemas into relations or database tables. Data dependency plays a key role in...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Dec 2013

    Study of Services and Privacy Usage in Cloud Computing

    In last decade, there are several survey point out over privacy and services has risen and increasingly becoming central point for IT industries. Almost every day, IT sector, network security and sensitive data are being broken. This uses more advanced techniques to protect their information. Privacy is a very essential...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Dec 2013

    Performance Improvement of Software as a Service and Platform as a Service in Cloud Computing Solution

    The word cloud (also phrased as \"The cloud\") is used as a metaphor for \"The Internet\", so the phrase cloud computing means \"A type of Internet-based computing\", where different services - such as servers, storage and applications - - are delivered to an organization's computers and devices through the Internet....

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Comparative Based Study of Scheduling Algorithms for Resource Management in Cloud Computing Environment

    Cloud Computing (CC) is emerging as the next generation platform which would facilitate the user on pay as the user use mode as per requirement. It provides a number of benefits which could not otherwise be realized. The primary aim of CC is to provide efficient access to remote and...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Feb 2013

    Comparison of Intel Single-Core and Intel Dual-Core Processor Performance

    Computer system performance and evaluation deal with investigation of computer components (both hardware and software) with a view of establishing the level of their performances. This paper, carry out performance evaluation studies on Intel single-core and dual-core process to know which of the processor have better execution time and throughput....

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Dec 2013

    Challenging Issues of a Context-Aware Mobile Computing Framework

    Context-aware mobile technology has garnered lot of attention in recent times. Context-aware applications are self-regulating and self-monitoring. Building a context-awareness framework is a serious challenge. This paper presents an idea for the development of a context-aware mobile framework. The process of proposing such a framework is quite a challenging task...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Design & Analysis of Micro Strip Patch Antenna

    Micro strip antenna is most common small sized antenna in which a metal patch is deposited on dielectric material. Micro strip patch antennas have been an attractive choice in mobile and radio wireless communication. They have advantages such as low profile, low cost and robust. However, at the same time...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    An Efficient Clustering Technique for Deterministically Deployed Wireless Sensor Networks

    In wireless sensor networks the deployment of nodes is an important factor that affects all the aspects of system like coverage, connectivity, bandwidth, packet loss and lifetime of network. In this paper, the authors propose a new clustering technique for enhanced lifetime of the network in deterministic deployment of the...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Clustering the Nodes With Trust Value Using Iterative Process of Watchdog Mechanism in Networks

    DTN (Delay/Distribution Tolerant Networks) is important field in wireless communication and network security which is emerging as vehicular, planetaryin planetary, underwater and satellite networks. Finally they say it as end-to-end communication latency and the lack of end-to-end path from source to destination. So these characters have several challenges to the...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    A Novel Security Based Model for Wireless Mesh Networks

    Wireless Mesh Network (WMN) is a new emerging field with its potential applications in extremely unpredictable and dynamic environments. WMN has the feather of self-organization, distributed structure. WMN is going to address the internet provision to users at low cost anytime from anywhere, as it allows a fast, easy and...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Secured Position Based Grid Location Service for MANET Using SGF

    Position based routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Correctness of location messages. These routing protocols use geographical information to make forwarding decisions, resulting in a significant reduction in the number of routing messages. However, current position aided routing protocols were not designed...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Adaptive Load Balancing in DSR

    A mobile ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services regularly available in wide-area networks to which the hosts may normally be connected. In this paper, the authors present an effective scheme to...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Client Server Network Management System for WLAN (Wi-Fi) With Remote Monitoring

    Network management Systems have played a great important role in information systems. There are different network management systems such as remote monitoring, desktop sharing, bandwidth management etc. This paper elaborates the above mentioned issues i.e., remote desktop sharing, bandwidth management and Remote monitoring which are accumulated in single network management...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Crossbar Switch for Network Processor Application

    A network processor is an integrated circuit, with a feature set designed to tackle the needs of the networking application domain. Typically NPs are software programmable and have generic functions, which are similar to general purpose central processing units, commonly used in many different products. Due to the fact that...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    A Comparison Study for PSD Performance in OFDM Systems Based on Using Autocorrelation Techniques

    Cooperative wireless communication relay networks in OFDM-based systems have been shown to improve performance in various systems using digital modulation techniques as a form of spatial diversity, OFDM, a multicarrier modulation technique, is widely adopted because of its many advantages. Most of the time, in-band spectrum of the multicarrier signal...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Linear PWM Strategy for SMPS

    A switched-mode power supply (Switching-Mode Power Supply or SMPS) is an electronic Power supply incorporates a switching regulator in order to be highly efficient in the conversion of electrical power. In SMPS using PWM chip, It requires hyperbolic curve of nonlinear nature of Input voltage & on time for smooth...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Apr 2013

    Security and Privacy in Biometrics: A Review

    The term "Biometrics" is derived from the Greek words bio (life) and metric (to measure).It refers to the automated recognition of individuals based on their physiological or behavioural traits like fingerprints, hand geometry, face, iris recognition, signature, voice and many more. By using biometrics it is possible to confirm or...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jul 2013

    Information Leakage Through Social Networking Websites Leads to Lack of Privacy and Identity Theft Security Issues

    Social Networking Websites (SNW) such as Facebook, Orkut and Twitter etc., have gained more attractiveness in recent days. Because of its large number of usage, and large amount of information, they become a potential network for malicious users or attackers to exploit. Most of the social networking websites try to...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) are a set of mobile nodes which are self-configuring and connected by wireless links automatically as per the defined routing protocol. Security is an essential requirement in MANETs. Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    A Systematic Approach for Ensuring Security and Efficiency in Cloud Computing

    Cloud computing is the latest trend of today's IT industries. It is the solution for the problem that occurs due to the resources availability and its utilization over the network. The popularity of cloud computing has increased due to its great policy of pay-as-you-use or resource-on-demand but still it lacks...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Oct 2013

    A Comparative Study of Security Issues& Challenges of Cloud Computing

    Cloud computing is rapidly changing the whole scenario of distributed system and it has given a fresh meaning to distributed system. Although cloud computing is delivering essential services and benefits such as low price services, on demand self-service, broad network access, large scale computation and highly availability of resources, but...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Feb 2013

    Security Enhancement in Cloud Computing (CC)

    Cloud Computing (CC) is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. CC is becoming one of the most important areas in the information technology world. Several...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    An Improved Authentication Technique with OTP in Cloud Computing

    Today data security plays an important role in the field of software and quality of service, cloud computing focuses a new challenging security threats. Therefore, a data security model must solve the most challenges of cloud computing security. Cloud computing is a capable technology to make easy development of large-scale,...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Aug 2013

    Convergence of IT and Data Mining with Other Technologies

    In this age of technology and communication convergence, the user cannot help but be impacted by technologies and innovations that center on computers. This paper examines the growing need for a secure environment and a general-purpose analytics engine. The process need for secure environment is physical or It security and...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Securing the Cloud Environment Using OTP

    In today's scenario, websites have been converted from just a display of information into an online transaction in the form of goods, services, or money. Along with development, the security of the website is also need to be tightened, not just rely on usernames and passwords but also to the...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Jun 2013

    Door Lock System through Face Recognition Using MATLAB

    Face recognition is a biometric technology with a wide range of potential applications such as access control, banking, information security, human computer interaction, virtual reality, database retrieval etc. This paper addresses the building of face recognition system by using Principal Component Analysis (PCA) method. PCA is a statistical approach used...

    Provided By International Scientific Research Organization for Science, Engineering and Technology

  • White Papers // Feb 2013

    Study of Threats, Risk and Challenges in Cloud Computing

    Cloud computing security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. In this paper, the authors present security issues that fetch...

    Provided By International Scientific Research Organization for Science, Engineering and Technology