Interscience Open Access Journals

Displaying 41-80 of 442 results

  • White Papers // Apr 2013

    Comparison of Fuzzy Logic Controllers for a Multivariable Process

    The Interval Type-2 Fuzzy Logic Controller (IT2FLC) for a Quadruple Tank Process (QTP) is demonstrated in this paper. Here, the interval type-2 based fuzzy membership function is used. The QTP is made to operate in minimum phase mode. The vertices of fuzzy membership functions are tuned with IT2FLC to minimize...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Rate Compatible Punctured Turbo-Coded Hybrid ARQ for OFDM System

    Now-a-day's Orthogonal Frequency Division Multiplexing (OFDM) is under intense research for broadband wireless transmission because of its robustness against multipath fading. A major concern in data communication such as OFDM is to control transmission errors caused by the channel noise so that error free data can be delivered to the...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Current Reuse Active Inductor Based Wideband LNA

    In this paper, the authors present the design of an active inductor based wideband LNA using current reuse topology, which is designed and simulated in 0.18um CMOS technology. The low noise amplifier is considered to be the key block in an RF receiver. It plays a critical role in determining...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Hermitian Symmetry Based Fiber Non-Linearity Compensation in Optical OFDM Networks

    Orthogonal Frequency Division Multiplexing (OFDM) is a modulation technique which is now used in most new and emerging broadband wired and wireless communication systems such as standard 802.11a/b/g/n, Digital Video Broad casting TeleVision (DVB-TV), and Long Term Evolution (LTE) in the next mobile generation, due to its capacity in solving...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Wireless Real Time Proportional Control System

    This system provides low power consuming and low cost wireless sensor network. This system provides a real time temperature and humidity. It also gives proportional control action. This system consists of TI's MSP430 microcontroller which consumes ultra low power and improves the overall system performance. The Sensorion's SHT 11 sensor...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Efficient and Secure Authentication by Using 3-Path Transmission in Ad Hoc Networks

    Ad hoc networks are created dynamically and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any form of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The design and...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Maximizing the Lifetime and Security of Wireless Sensor Networks

    Recent technological advances have facilitated the widespread use of Wireless Sensor Networks in many applications such as battle field surveillance, environmental observations, biological detection and industrial diagnostics. In Wireless Sensor Networks, sensor nodes are typically power-constrained with limited lifetime, and so it's necessary to understand however long the network sustains...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Effects of a Barrier Layer in InGaAs Channel MOSFETs for Analog/ Mixed Signal System-on-Chip Applications

    Addition of a barrier layer in an InGaAs MOSFET, which shows promise for high performance logic applications due to enhanced electron mobility, further improves the electron mobility. The authors report, for the first time, a detailed investigation of the impact of different barrier layers on the analog performance of an...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    The Mathematical Analysis of Column Oriented Database

    There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Transmission Network Expansion with Transmission Loading Relief

    Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide regions It includes finding the optimal plan for the electrical system expansion, it must specify the transmission lines and/or transformers that should...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    CCI Cancellation Using KF in Faded MIMO Channels

    Multi Input Multi Output system (MIMO) has become a viable option to meet the demand of high data rate wireless communication. But MIMO system performance is severely affected by the presence of Co-Channel Interference (CCI). CCI cancellation in MIMO channel therefore is a challenging area of research. This paper provides...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Split MLSE Adaptive Equalization in Severely Faded Rayleigh MIMO Channels

    This paper presents an overview of adaptive equalization used in Multiple-Input-Multiple-Output (MIMO) wireless systems. In this paper, the authors consider two-user transmission over a Rayleigh frequency selective fading channel, in which the Channel State Information (CSI) is known by the receiver. Subject to an average transmit power constraint, they study...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Artificial Neural Network Aided Retina Based Biometric Identification System

    Artificial Neural Network (ANN)s are efficient means of prediction, optimization and recognition. Retina is a unique biometric pattern that can be used as a part of a verification system. An ANN can be configured and trained to handle such variations observed in the texture of the retina. The specialty of...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Performance Comparison of Spread Spectrum Modulation for Wireless Channels Using Ann - Assisted Pseudo - Noise Sequence Generator

    One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator. Though several approaches are available that deals with the PN - sequence generator, there always exists the possibility of exploring the use of innovative methods through...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Rake Receiver Design for Ultra Wide Band Application

    In this paper, the authors describe the design and implementation of a rake receiver for use with Ultra Wide Band (UWB) systems. The rake receiver uses Spread Spectrum Modulation (SSM) aided by kasami sequence generator. The combination is found to be effective in dealing with multipath fading and signal to...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    The New Adaptive Active Constellation Extension Algorithm for Par Minimization in OFDM Systems

    In this paper, the peak-to-average ratio reduction in OFDM systems is implemented by the Adaptive Active Constellation Extension (ACE) technique which is more simple and attractive for practical downlink implementation purpose. However, in normal constellation method the authors cannot achieve the minimum PAR if the target clipping level is much...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Implementation and Comparison of Wavelet Transform and Fourier Transform in Wi-Max OFDM System

    WIMAX wireless communication is based on OFDM technology which enables going towards 4G Based on IEEE 802.16d-2004. But the reliability of OFDM is limited with the problems of time varying nature of the channel. This can reduced by adding cyclic prefix or guard interval between each block of data symbols....

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Underground Wireless Communication Channel Modeling and Simulation Using 0.3GMSK Modulation Considering Penetration and Scattering Loss

    Wireless communication inside mines and tunnels is very different from that in terrestrial environment because of the strong attenuation of signals. Here, the authors are developing an empirical model for the underground wireless communication channel based on experimental data which help in predicting the average received signal strength at a...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    E-Converse an Affordable Touch Screen Solution to Intrigue Dining Experience

    Ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc. These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the e-converse,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey Paper on Wifi Community on Android Phones

    With the development of wireless communication, the popularity of android phones, the increasing of social networking services, mobile social networking has become a hot research topic. Personal mobile devices have become ubiquitous and an inseparable part of the authors' daily lives. These devices have evolved rapidly from simple phones and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Counter Measures Against Evolving Search Engine Spamming Techniques

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. In this paper, the authors have characterized some commonly used black hat techniques, and they have...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Survey on Review Spam Detection

    Today due to the popularity of E-commerce sites it became a target for spammers apart from well-known email and web spam. The proliferation of E-commerce sites has made web an excellent source of gathering customer reviews about products; as there is no quality control anyone one can write anything which...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Controlling and Monitoring of Remote Host

    In today's world, the role of remote access is changing dramatically. So accessing network remotely is an important issue. The proposed system allows administrator to access network from anywhere at any time. Administrator user can control and monitor the network using RFB (Remote FreameBuffer) protocol. Administrator user can run server...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Online Log Analysis for Detecting User Behavior

    Most search engines are not provided the facility of expected results every time. Because two words can have same meaning e.g. if query \"Block size\" is entered in search engine then search engine will display the records related to operating system as well as the living apartment block size. But...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Review on Approaches and Models Proposed for Software Reliability Testing

    Reliability testing of software is the key area of concern now-a-days; especially with the software which is safety critical and security prone systems. There is always a need of high software reliability. Most of the present models for evaluation of software reliability are based on statistical and probability approach. When...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Middleware Infrastructure for Predicate Detection in Asynchronous Environment

    Context-awareness is an essential feature of pervasive applications, and runtime detection of contextual properties is one of the primary approaches to enabling context awareness. However, existing context-aware middleware does not provide sufficient support for detection of contextual properties in asynchronous environments. The contextual activities usually involve multiple context collecting devices,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Qualitative Evaluation of Routing Protocols of MANET in Wireless Sensor Network

    A Mobile Ad-hoc NETwork (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to extend mobility into the realm of autonomous, mobile and wireless domains, where a set of nodes form the network routing infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Text Clustering in Concept Based Mining

    Text mining mostly used to find out unknown information from natural language processing and data mining by applying various techniques. In text mining most techniques depends on statistical analysis of terms. Statistical analysis trances important terms within document only. However this concept based mining model analyses terms in sentence, document...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Location Based Automatic Sound Profile Switching Application in Android Mobiles

    This is an android application for automatic profile switching as per location. There are many places like hospitals, petrol pumps, universities, corporate offices etc. where it is clearly mentioned, \"Keep the user mobile phones silent!\" Many times people forget to switch the mobile to the \"Silent Mode\" which is not...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient Algorithm for Clustering Nodes, Classifying and Replication of Content on Demand Basis for Content Distribution in P2P Overlay Networks

    In this paper the authors propose an efficient algorithm for clustering nodes, classifying and replication of content on demand basis for content distribution in p2p overlay networks. Peer-to-peer overlay networks are a good solution for distributed computing than client-server model since nodes in P2P networks act both as client and...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Optimized Arm Scheme for Distinct Network Data Set

    Association Rule Mining (ARM) discovers correlations between different item sets in a transaction database. It provides important knowledge in business for decision makers. Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Post-Mining of Association Rules Using Ontologies and Rule Schemas

    Knowledge Discovery and Databases (KDD) deals with the overall process of discovering useful knowledge from data. Data mining is a particular step in this process by applying specific algorithms for extracting hidden fact in the data. Association rule mining is one of the data mining techniques that generate a large...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Optimized Intention for Continuous Queries in the Active Data Aggregation Network with Cost Model

    Within an RDBMS streams of changes to the data and reporting when the result of a query defined over the data changes. These queries are referred to as the continuous queries since they continually produce results whenever new data arrives or existing data changes. To make online decision the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient and Systematic Virus Detection Processor for Embedded Network Security

    Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Wireless Sensor Network with Centralized Embedded Web Server Using ARM 7

    A plat form independent embedded web server and its integration into a network of wireless sensor nodes is implemented here. The embedded web server is designed and built as an expansion module for one of the nodes in the Wireless Sensor Network (WSN). It allows authorized Internet users to establish...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Implementation and Performance Analysis Evaluation of A New MANET Routing Protocol in Ns-2

    Mobile Ad-hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The efficient routing protocols can provide significant benefits to Mobile Ad-hoc NETworks, in terms of both performance and reliability....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2013

    Minimization of Data Replica in Mobile Adhoc Network Routing

    Ad hoc networks have characteristics such as flexibility, easy deployment, robustness which makes them an interesting technology for various applications. Ad hoc networks are considered as the most promising terminal networks in future mobile communications. A novel position based opportunistic routing protocol, in which several forwarding candidates cache the packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Selection of Optimal Discount of Retail Assortments with Data Mining Approach

    Recently, the capabilities of generating and collecting data have been increasing rapidly. Widespread use of bar codes for most commercial products, the computerization of many business, and the advance in data collection tools have provided the users with huge amount of retail data. This explosive growth in data and databases...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A System for Outlier Detection of High Dimensional Data

    In high dimensional data large no of outliers are embedded in low dimensional subspaces known as projected outliers, but most of existing outlier detection techniques are unable to find these projected outliers, because these methods perform detection of abnormal patterns in full data space. So, outlier detection in high dimensional...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Item Set Extraction without Using Constraints

    In this paper the authors present the Item set extraction without using constraints, a general and compact structure which provides tight integration of item set extraction in a relational DBMS. Since no constraint is enforced during the index creation phase, It provides a complete representation of the original database. To...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    An Efficient Algorithm for Mining of Frequent Items Using Incremental Model

    Data mining is a part of Knowledge Discovery in Database process (KDD). As technology advances, floods of data can be produced and shared in many appliances such as wireless Sensor networks or web click streams. This calls for extracting useful information and knowledge from streams of data. In this paper,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Distributed Accountability and Auditing in Cloud

    The widespread use of Cloud computing has opened up new challenges by introducing different types of trust scenario. The lack of confidence in trusting information flow (users data are usually processes remotely in unknown machines that do not owned or operated by user) in cloud has become common, as users...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Insight into the Importance of Requirements Engineering

    When developing a software, one of the most important aspects for success of any software project is to get the requirements right. The success of any software project depends on the quality of the requirements. As the projects change over the time, the authors try to study the requirement process...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Authenticated Connection establishment in Web Applications using Steganography

    A web application is an application that is accessed over a network such as the Internet or an intranet. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. The ability to update...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Analysis of Complexities for finding efficient Association Rule Mining Algorithms

    Several algorithms for association rule mining, have been implemented including a variation of Apriori, an algorithm using hash functions for finding large 2-itemsets and 3-itemsets and direct search method for finding other large k-itemsets, and another variation of Eclat algorithm using perfect hash functions for 2-itemsets and 3-itemsets and the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Association Rule Mining Using Mapping on Frequent 1- itemsets

    The a priori algorithm for association rule mining is time consuming in the initial stages of the algorithm since usually large number of candidate itemsets is generated. To cope with this, several alternatives are suggested using hash functions. The authors provide a method to arrive at hash functions for 2-itemsets...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparatively Analysis of Fix and Dynamic Size Frequent Pattern Discovery Methods Using in Web Personalisation

    In this paper, the authors study and analysis of two methods of data mining. One is fix sized pattern discovery and second method dynamic size pattern discovery method. A fixed sized pattern discovery method is a prori method. Which is also called step by step frequent pattern mining. And variable...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Gesture Based Touchpad Security System with Design of Touch Screen Controller

    In this paper, the authors present a new approach on the design of security systems by using a touch sensitive device. Security is a permanent concern in a variety of environments ranging from physical access restriction in home and industrial settings to information security in digital systems. Numeric passwords, fingerprint...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Detection of Data Leakage

    Sometimes sensitive data must be handed over to supposedly trust third parties. With the extensive application of database systems, the owners of the databases have urgent requirements to protect their copyright of databases. Some of the data is leaked and found in an unauthorized place the distributor must assess the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Hiding Secret Data Through Steganography in VOIP

    Steganography is an effective way of hiding secret data, by this means of protecting the data from unauthorized or unwanted viewing. Using cryptography technique will encrypt and decrypt message to provide better security. Cryptography protects the message from being read by unauthorized parties, steganography lets the sender conceal the fact...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Lock-Free Dining Philosopher

    The past few years have marked the start of a historic transition from sequential to parallel computation. The necessity to write parallel programs is increasing as systems are getting more complex while processor speed increases are slowing down. Current parallel programming uses low-level programming constructs like threads and explicit synchronization...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Online Log Analysis for Detecting User Behavior

    Most search engines are not provided the facility of expected results every time. Because two words can have same meaning e.g. if query \"Block size\" is entered in search engine then search engine will display the records related to operating system as well as the living apartment block size. But...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    A Review on Approaches and Models Proposed for Software Reliability Testing

    Reliability testing of software is the key area of concern now-a-days; especially with the software which is safety critical and security prone systems. There is always a need of high software reliability. Most of the present models for evaluation of software reliability are based on statistical and probability approach. When...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Middleware Infrastructure for Predicate Detection in Asynchronous Environment

    Context-awareness is an essential feature of pervasive applications, and runtime detection of contextual properties is one of the primary approaches to enabling context awareness. However, existing context-aware middleware does not provide sufficient support for detection of contextual properties in asynchronous environments. The contextual activities usually involve multiple context collecting devices,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Qualitative Evaluation of Routing Protocols of MANET in Wireless Sensor Network

    A Mobile Ad-hoc NETwork (MANET) is composed of mobile nodes without any infrastructure. Mobile nodes self-organize to form a network over radio links. The goal of MANETs is to extend mobility into the realm of autonomous, mobile and wireless domains, where a set of nodes form the network routing infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Text Clustering in Concept Based Mining

    Text mining mostly used to find out unknown information from natural language processing and data mining by applying various techniques. In text mining most techniques depends on statistical analysis of terms. Statistical analysis trances important terms within document only. However this concept based mining model analyses terms in sentence, document...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Location Based Automatic Sound Profile Switching Application in Android Mobiles

    This is an android application for automatic profile switching as per location. There are many places like hospitals, petrol pumps, universities, corporate offices etc. where it is clearly mentioned, \"Keep the user mobile phones silent!\" Many times people forget to switch the mobile to the \"Silent Mode\" which is not...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Distributed Shared Files Management

    Most often file sharing is the common and basic requirement when users work on a particular domain or area of interest. Users can use software that connects in to a peer-to-peer network to access shared files on the computers of other users (i.e. peers) connected to the network. Files of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    The Interplay of Risk Management and Uncertainty: A Project Management Practice Perspective

    The empirical investigation of actual practice and its contextual variability has helped better understand risk management practice. The results confirm some well-known assumptions about practices, but at the same time produced unexpected results that can stimulate the development of new practices adapted to highly uncertain contexts. It seems logical to...

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Critical Success Factors for Implementing CRM Using Data Mining

    The paper presents the critical success factors for implementing the Customer Relationship Management (CRM) in a firm using the Data Mining (DM). The use of the data mining in CRM is widely accepted by the firms. The success of proper implementation of CRM using data mining in firms is mixed....

    Provided By Interscience Open Access Journals

  • White Papers // May 2011

    Studies of Manufacturing Process Control: A Technological Transfer of Soft Computing

    The field of soft computing embraces several techniques that have been inspired by nature but are mathematical. These techniques are artificial neural networks, fuzzy logic and evolutionary algorithms. Often these techniques are considered part of artificial intelligence, however the name artificial intelligence is more properly given to techniques which try...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Publishing Search Logs Privacy Guarantee for User Sensitive Information

    Search engine companies maintain the search log to store the histories of their users search queries. These search logs are gold mines for researchers. However, search engine companies take care of publishing search log in order to provide privacy for user's sensitive information. In this paper the authors analyze algorithm...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Intelligent Phishing Website Detection and Prevention System by Using Link Guard Algorithm

    Phishing is a new type of network attack where the attacker creates a replica of an existing web page to fool users (e.g., by using specially designed e-mails or instant messages) into submitting personal, financial, or password data to what they think is their service provides' website. In this paper,...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Acoustic Sensors to Detect Clogs in Sewer Pipelines

    Blockages in sewage pipelines are difficult to be cleaned or extracted. In order to manage sewer blockage proactively sewer managers need to be able to identify the location of blockages precisely. As of now, only humans do this sully job of cleaning the sewages. Many human right organizations have been...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Feature Selection and Classification of Intrusion Detection System Using Rough Set

    With the expansion of computer network there is a challenge to compete with the intruders who can easily break into the system. So it becomes a necessity to device systems or algorithms that can not only detect intrusion but can also improve the detection rate. In this paper the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Study of Advanced Encryption Tools for Data Security

    With the rapid growth and uses of internet, the task of protection of data and information is become a key challenge to the user as well as security experts. In the era of e-commerce, online shopping, online banking information security is a vital issue. Information may be hacked, stolen and...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Development of Scada Like Application Using Arduino with .NET Interface

    Now-a-days SCADA systems are used for home automation, greenhouse automation, E-agriculture etc. Basically these SCADA applications include level monitoring, light & climate control, security & surveillance, control and manage spatially separated utility sites and control of shutters & doors and so on. With the arrival of new hardware and software...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    New Dynamic Query Optimization Technique in Relational Database Management Systems

    Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    Optimized Intention for Continuous Queries in the Active Data Aggregation Network with Cost Model

    Within an RDBMS streams of changes to the data and reporting when the result of a query defined over the data changes. These queries are referred to as the continuous queries since they continually produce results whenever new data arrives or existing data changes. To make online decision the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2013

    An Efficient and Systematic Virus Detection Processor for Embedded Network Security

    Network security has always been an important issue and its application is ready to perform powerful pattern matching to protect against virus attacks, spam and Trojan horses. However, attacks such as spam, spyware, worms, viruses, and phishing target the application layer rather than the network layer. Therefore, traditional firewalls no...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Security Escalation Using Key Template and Distortion Reduction in Audio Steganography

    Due to the abrupt enhancement in the development of the distributed computing in recent years, there is necessity of efficient protection of the information that is send through the network. For this purpose, steganography is used as the one of the method to protect the secret message against the intruders....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Survey of Botnets and Detection Tools

    Botnet meaning bot network is a collection of infected computers under the command and control of a single individual known as a botmaster. Botnets are a current threat to the internet community and have recently been a root cause of many internet attacks. Various attacks that include spamming, distributed denial...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Effective Transmission of Data in Group Editor Using Multithreaded Server

    Group editors are a classic model and research vehicle for distributed interactive groupware applications because they typically manipulate shared data in a coordinated manner. Operational Transformation (OT) has been well accepted in group editors for achieving optimistic consistency control. OT allows local operations to execute in a non blocking manner...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Extracting Accurate Data from Multiple Conflicting Information on Web Sources

    For the World-Wide Web has become the most important information source for most of the users. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can the users automatically identify which one is likely the true fact?, In...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    A Tool for Effective Detection of Fraud in Credit Card System

    Due to the rise and rapid growth of E-commerce, use of credit cards for online purchases has dramatically increased and it caused an explosion in the credit card fraud. Fraud is one of the major ethical issues in the credit card industry. As credit card becomes the most popular mode...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2013

    Efficient Load Balancing in Peer-to-Peer Systems Using Virtual Servers

    Load balancing is a critical issue for the efficient operation of peer-to-peer networks. With the notion of virtual servers, peers participating in a heterogeneous, structured Peer-To-Peer (P2P) network may host different numbers of virtual servers, and by migrating virtual servers, peers can balance their loads proportional to their capacities. Peers...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Light Weight Security for OPC UA Based Architecture

    The Open Platform Communication (OPC) is becoming the universal standard for platform independent data sharing and data access. The OPC standard defines communication standards to be followed for data integration in the automation industry. The OPC communication facilitates a language independent way of communication and by using this; all devices...

    Provided By Interscience Open Access Journals