Interscience Open Access Journals

Displaying 161-200 of 502 results

  • White Papers // Dec 2012

    Automated Swim (Single Window Infrastructure Management) for Cloud

    Data centers manage complex server environments, including physical and virtual machines, across a wide variety of platforms, and often in geographically dispersed locations. Information Technology managers are responsible for ensuring that servers in these increasingly complex environments are properly configured and monitored throughout the IT life cycle. They also face...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Near Duplicate Matching Scheme for E-Mail Spam Detection

    Today the major problem that the people are facing is spam mails or e-mail spam. In recent years there are so many schemes are developed to detect the spam emails. Here the primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Smart Worms Defense and Detection

    There are several worm attacks in the recent years, this leads to an essentiality of producing new detection technique for worm attacks. In this paper, the authors present a spectrum based smart worm detection scheme, this is based on the idea of detection of worm in the frequency domain. This...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Use of Web Harvesting Technique

    Web harvesting (Web data extraction) is a computer software technique of extracting information from websites. Usually, such software programs simulate human exploration of the Web by either implementing low-level Hyper-Text Transfer Protocol (HTTP), or embedding certain full-fledged Web browsers. Web harvesting is closely related to Web indexing, which indexes information...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Efficient Multi-Constrained Feasible Path Selection for Manet

    Quality-of-Service (QoS) routing in an ad-hoc network is difficult because the network topology may change constantly and the available state information for routing is inherently imprecise. This paper proposes a method for multi-constrained feasible path selection for MANET. The authors introduce the composite function which allows OLSR to find the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Review of XY Routing Algorithm for Network-on-Chip Architecture

    The Network-on-Chip (NoC) is Network-version of System-on-Chip (SoC) means that on-chip communication is done through packet based networks. In NOC topology, routing algorithm and switching are main terminology. The routing algorithm is one of the key factor in NOC architecture. The routing algorithm, which defines as the path taken by...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Raptor Code Based Secure Storage in Cloud Computing

    The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-peruse service business model known as cloud computing. Cloud data storage redefines the security issues targeted on customer's outsourced data. To ensure the correctness of users' data in the cloud, the authors...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Improved Security System in Mobile Cloud Access Through Fuzzy Intrusion Detection Technique

    Mobile phones are playing a vital role in every one's life. The computing strategy of mobile internet usage is lower than the mobile usage, this may due to the security threat. In general mobility and cloud computing initializing the global marketing, sales and development activities using mobile platforms to market...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Secured Cloud Environment with a New Approach

    Cloud computing is the technology of resource sharing in the present setup, where in the users never look to buy a resource in terms of software, hardware, and many as such only in the name of pay for use it is being used but they have to face big issue...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Testing As A Service (TAAS) - An Enhanced Security Framework for TAAS in Cloud Environment

    Testing becomes an important process not only in terms of exposure but also in terms of performance, safety, usability. Test Environment that directly represents the production environment is too expensive in terms of hardware, software licenses and more people. Cloud computing supports an everything as a service (XaaS) Delivery model....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Simulation of Adaptive Channel Equalization for BPSK,QPSK and 8-PSK Schemes

    The distortion and inter symbol interference caused by multipath effects of channel degrades the quality of signal transmission in transmission system of digital baseband. Adaptive channel equalization is used commonly to compensate these effects so as to increase the reliability of propagation. Recursive Least Squares (RLS) algorithm is most commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Statistical Analysis of Wsn Based Indoor Positioning Localization Schemes with Kalman Filtering

    Wireless Sensor Network (WSN) is used for determining the Indoor Positioning of objects and persons since recent years. WSN has been implemented in indoor positioning applications such as real time tracking of humans/objects, patient monitoring in health care, navigation, warehouses for inventory monitoring, shopping malls, etc. But one of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Inter Carrier Interference and Signal to Interference Ratio of Various Pulse Shaping Functions Used in Ofdm System with Carrier Frequency Offset

    Orthogonal Frequency Division Multiplexing (OFDM) is the important modulation of choice for fourth generation broadband multimedia wireless systems. This paper is focused on the problem of reducing the Inter-Carrier Interference (ICI) and signal to noise ratio in the transmission over OFDM using various pulse shaping methods. Here, the authors have...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    LCD Display Controller Application by Dynamically Reconfigurable PLL Using NIOS II

    The Altera cyclone family of FPGA provides the ability to perform run time reconfiguration which is known as dynamic reconfiguration. This paper concentrates on how to take a complex system-on-chip design into three different components: fixed hardware, reconfigurable hardware and software, each handled by dedicated sub-flow. The method to dynamically...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    2-D Implementation of Digital Gabor Filter Design Using Verilog

    Fingerprint or face image enhancement using Gabor filter is one of highly computational complexity in fingerprint verification process. Gabor filter has a complex valued convolution kernel and a data format with complex values is used. So, implementing Gabor filter is very significant in fingerprint verification process. Designing Gabor filter will...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Leakage Power Reduction in CMOS Circuits Using Leakage Control Transistor Technique in Nanoscale Technology

    In CMOS circuits, as the technology scales down to nanoscale, the sub-threshold leakage current increases with the decrease in the threshold voltage. Lector, a technique to tackle the leakage problem in CMOS circuits, uses two additional leakage control transistors, which are self-controlled, in a path from supply to ground which...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    LDPC Architecture Implementation by Reducing the Memory Utilization

    As the low density parity check codes has proved their accuracy in error correcting, considering the LDPC as reference the architecture of LDPC (Low Density Parity Check) is studied. LDPC coding contains check nodes and variable nodes which has their memory elements respectively. So, an efficient use of memory can...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Gesture Based Touchpad Security System with Design of Touch Screen Controller

    In this paper, the authors present a new approach on the design of security systems by using a touch sensitive device. Security is a permanent concern in a variety of environments ranging from physical access restriction in home and industrial settings to information security in digital systems. Numeric passwords, fingerprint...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Loss Allocation of Transmission Line and Minimization of Loss for 5 Bus,14 Bus &30 Bus Systems

    In this paper, the authors focus on the issue of transmission loss allocation and transmission loss minimization by incorporating UPFC injection model using load flow analysis. To investigate the effect of the UPFC on the steady state condition of the system and load flow, different models can be used. These...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Performance Evalution of CNTFET-Based SRAM Cell Design

    Carbon Nano-Tube Field Effect Transistor (CNTFET) technology with their excellent current capabilities, ballistic transport operation and superior thermal conductivities has proved to be a very promising and superior alternative to the conventional CMOS technology. A detailed analysis and simulation based assessment of circuit performance of this technology is presented here....

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Low Power ASIC Implementation of a 256 Bit Key AES Crypto-Processor at 45nm Technology

    Advanced Encryption Standard (AES) has received significant interest over the past decade due to its performance and security level. Low power devices have gained extreme importance in market today. Power dissipation is one of the most important design constraints to be handled well. A key to successful power management is...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Early Estimation of Delay in Binary to BCD Convertor

    Novel high speed architecture for fixed bit binary to BCD conversion which is better in terms of delay is presented in this paper. In recent years, decimal data processing applications have grown and thus there is a need to have hardware support for decimal arithmetic. Decimal digit multipliers are having...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    A Novel Matlab/Simelectronics Model of PV Array with MPPT Controller

    A Photo-Voltaic Array (PVA) simulation model to be used in Matlab/Simelectronic GUI environment will be developed and analyzed in this paper. In Sim-electronic environment, the Simulink signal is converted to physical signal and again physical signal is converted to Simulink signal. The model is developed using basic circuit equations of...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    EBDP Buffer Sizing Strategy 802.11 Based WLANS

    In this paper, the authors present wired routers, for whom the sizing of buffers is an active research topic. The classical rule of thumb for sizing wired buffers is to set buffer sizes to be the product of the bandwidth and the average delay of the flows utilizing this link,...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Performance Optimization in Networks Serving Heterogeneous Flows

    Channel-aware scheduling strategies have emerged as an effective mechanism for improving the throughput of wireless data users by exploiting rate variations. The improvement in throughput comes however at the expense of an increase in the variability of the service rate received over time. While the larger variability only has a...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Ontology for Automatic Acquisition Web User Information

    Information retrieval has a well-established tradition of performing laboratory experiments on test collections to compare the relative effectiveness of different retrieval approaches. The experimental design specifies the evaluation criterion to be used to determine if one approach is better than another. Retrieval behavior is sufficiently complex to be difficult to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    The Awareness Network of Monitoring and Displaying Actions of Social Networks

    The concept of awareness plays a pivotal role in research in Computer-Supported Cooperative Work. Recently, Software Engineering researchers interested in the collaborative nature of software development have explored the implications of this concept in the design of software development tools. A critical aspect of awareness is the associated coordinative work...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Tracking of Moving Object in Wireless Sensor Network

    A Wireless Sensor Network is a collection of sensor nodes distributed into a network to monitor the environmental conditions and send the sensed data to the Base Station. Wireless Sensor Network is one of the rapidly developing area in which energy consumption is the most important aspect to be considered...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    A Public Key Distribution and Broadcast Authentication Scheme for Wireless Sensor Networks

    In wireless sensor networks, broadcast communication is the most fundamental and prevailing communication pattern. Securing the broadcast messages from the adversary is critical issue. To defend the WSNs against the adversary attacks of impersonation of a broadcast source or receiver, modification/fabrication of the broadcast message, attacker injecting malicious traffic to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Neighbourhood Load Routing and Multi-Channels in Wireless Mesh Networks

    As an emerging technology, wireless mesh networks are making significant progress in the area of wireless networks in recent years. Routing in Wireless Mesh Network (WMN) is challenging because of the unpredictable variations of the wireless environment. Traditional mechanisms have been proved that the routing performance would get deteriorated and...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Counting Bloom Filter Architecture in VLSI Network Systems

    The Counting Bloom Filter (CBF) is useful for real time applications where the time and space efficiency is the main consideration in performing a set membership tests. The CBF estimates whether an element is present in a large array or not by allowing false positives and by not permitting false...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Minimization of Load Based Resources in Cloud Computing Systems

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and Web services. The authors' objective is to develop an effective load balancing algorithm using Divisible Load Scheduling Theorem to maximize or minimize different performance parameters (throughput, latency for example) for the clouds of different sizes. Central to...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Evolution of Crowd-Sourcing From Computer to Mobile Systems

    As crowd-sourcing is becoming popular for problem solving and completing a task, it is now very important to use this concept in an advance manner. It can also be used as a distributed and vast source of information. This concept is now evolving in world of mobile systems. This will...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    Simulation and Performance Analysis Evaluation for Multipath Extension of Aodv to Improve End to End Delay, Route Error Sent, Routing Load and Packet Drop Ratio

    This paper describes improvement in standard routing protocol AODV for mobile ad-hoc networks. The mechanism setups multiple optimal paths based on bandwidth and delay. It allows to store multiple optimal paths based on Bandwidth and delay. At time of link failure, it will switch to next available path. To set...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    GSM Based Intelligent Wireless Mobile Patient Monitoring System Using ZIGBEE Communication

    Miniaturization of biomedical sensors helped the fast development and popularization of information processing and wireless data transmission technology, the research of wireless medical monitoring system has became a hot topic. By utilizing the wireless technique to transmit information between medical sensor and monitoring control center, the free space of patients...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2012

    HTCPM: A Hybrid Test Case Prioritization Model for Web and GUI Applications

    Web and Event-Driven Applications (EDS) is a class of applications that is quickly becoming ubiquitous. All EDS take sequences of events (e.g., messages, mouse-clicks) as input, change their state, and produce an output (e.g., events, system calls, text messages), where as in web, user session data gathered as users operate...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    A High-Performance and Low-Power Delay Buffer

    In this paper, the authors present circuit design of a low-power delay buffer. The proposed delay buffer uses several new techniques to reduce its power consumption. Since, delay buffers are accessed sequentially, it adopts a ring-counter addressing scheme. In the ring counter, Double Edge-Triggered (DET) flip-flops are utilized to reduce...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    High Frequency Boost Converter Employing Soft Switching Auxiliary Resonant Circuit

    A new soft-switching boost converter is proposed in this paper. The conventional boost converter generates switching losses at turn ON and OFF, and this causes a reduction in the whole system's efficiency. The proposed boost converter utilizes a soft switching method using an auxiliary circuit with a resonant inductor and...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    Design & Implementation of Teacher Student Interaction System Using Zigbee & RFID

    Research of the past years has led to numerous novel developments and approaches for Wireless Sensor Networks (WSNs). However, most previous work has focused on either mathematical analysis or theoretical algorithms with extensive simulation results. In this paper, in order to realistically understand the complexity of WSNs, a ZigBee/IEEE 802.15.4...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2012

    A Survey of the Effect of Network Parameters on Communication Links in Wireless Sensor Networks

    Sensor networks are a collection of large number of low-cost, low-power, multifunctional, and small sensors. a transceiver and a power source .Wireless sensor networks hold the promise of many new applications in the area of monitoring and control. Examples include target tracking, intrusion detection, wildlife habitat monitoring, climate control and...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Role of Web Services in Migration of Legacy System to Service-Oriented Architecture

    Managing the convolution of systems is considered as a key confront in computing and is transact with numerous expansion projected at enhanced computerization. Service-Oriented Architectures (SOA) are predicted to facilitate the prerequisite of a large quantity of varied and contending web services which the potential users will be capable to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Improving Software Modularity Using AOP

    Software modularity is a software design technique that increases the level to which software is composed of separate interchangeable components called modules. The modules are devised by breaking down the program functions. Each module accomplishes one function and contains all that is necessary to accomplish it. Modules represent a separation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Model Based Software Development: Issues & Challenges

    One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Comparative Study on Privacy Preserving Association Rule Mining Algorithms

    The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Combining Retrieval With Ontology Browsing

    The Semantic Web provides a way to encode information and knowledge on web pages in a form that is easier for computers to understand and process. For Semantic Web documents to have an impact, they will have to be compatible with Web based indexing and retrieval. There are techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparisons Various Versions of GridFTP Protocols

    The GridFTP protocol has become a popular data movement tool used to build distributed grid-oriented applications. The GridFTP protocol extends the FTP protocol defined by and extended in some other IETF documents by adding certain features designed to improve the performance of data movement over a wide area network, to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Study of Artifical Intelligence in Intrusion Detection Systems

    Artificial Intelligence could make the use of Intrusion Detection Systems a lot easier than it is today. They could learn the preferences of the security officers and show the kind of alerts first that the officer has previously been most interested. As always, the hardest thing with learning AIs, is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Attack on E-Mail Encryption Protocols by Chosen Ciphertext Method

    Several security protocols (PGP, PEM, MOSS, S/MIME, PKCS#7, CMS, etc.) have been developed to provide confidentiality and authentication of electronic mail. These protocols are widely used and trusted for private communication over the Internet. The authors point out a potentially serious security hole in these protocols: any encrypted message can...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Extensive Simulation Analysis of AODV Protocol With IEEE 802.11 MAC for Chain Topology in MANET

    A Mobile Ad hoc NETwork (MANET) represents system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Routing is the task of directing data packets from a source node to a given destination. The main method for evaluating the performance of MANETs is...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    An Approach for Customer Behavior Analysis Using Web Mining

    Customer satisfaction is the key secret of success for all industries regardless of whether it is web enabled or not. This paper focuses the role of web mining in achieving a viable edge in business. Web mining is becoming the tool for success for those who adopt electronic means of...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2012

    Cloud Computing: A Survey

    Cloud computing provides huge computing services to the business for improving the organizational growth. Basic requirement needed for this technology is Internet but provides higher capability when compared to the Internet. Cloud computing is a combination of computation, software, data access and also provides storage services. In Cloud, storage of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Pattern Recognition Algorithms for Cluster Identification Problem

    There are large datasets in high dimensional database to solve the cluster identification problem and for identifying dense clusters in a noisy data. In this paper by using densely intra connected sub graphs the authors' analysis identified the clusters. They have used pattern recognition algorithms for representing the graphs and...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Software Inspection Improves Quality of Software Product

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Intelligent Software Agent Applied To Digital Forensic and Its Usefulness

    Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Flaws in Endair-A Secure Routing Protocol for MANETS

    Routing is the one of the essential criteria at network level in mobile ad hoc networks. Ad hoc network routing protocols are difficult to design, and secure because unable to handle rapid node mobility and network topology changes. It has been realized by many researchers, and several "Secure" routing protocols...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Application of Data Mining Using Bayesian Belief Network To Classify Quality of Web Services

    In this paper, the authors employed Na?ve Bayes, Augmented Na?ve Bayes, Tree Augmented Na?ve Bayes, Sons & Spouses, Markov Blanket, Augmented Markov Blanket, Semi Supervised and Bayesian network techniques to rank web services. The Bayesian Network is demonstrated on a dataset taken from literature. The dataset consists of 364 web...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Steganographic Algorithm and Hashing to Improve Authentication Using Mobile Phones

    Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms....

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Dual-Failure Survivability for Multi Quality Data Using Single pcycle

    Dual-failure scenarios are a real possibility in today's optical networks and it is becoming more and more important foe carriers and network operators to consider them when designing their networks. The p-Cycle is a recent approach in optical network protection. The p-Cycle use preconnected cycles of spare capacity to restore...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Time Analysis of the State Space of Real-Time Preemptive Systems

    The authors present in this paper an algorithm making it possible an efficient time analysis of the state space of preemptive real time systems modeled using Time Petri Nets with inhibitor arcs. For this effect, they discuss how to determine from the reachability graph linear and quantitative properties of the...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    An Alternate Idea for Storage Optimization in Search Engine

    The authors propose an alternate indexing storage technique of Search Engine. In this approach, they achieve reduced space complexity. They try to decrease time complexity for faster data retrieval and decrease storage space for efficient utilization of space. This paper provides an algorithm of indexing mechanism by which effective storage...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    A Statistical Approach for Voiced Speech Detection

    Detection of Voice in speech signal is a challenging problem in developing high-performance systems used in noisy environments. In this paper, the authors present an efficient algorithm for robust voiced speech detection and for the application to variable-rate speech coding. The key idea of the algorithm is considering speech energy...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Applications of Two Dimensional Cellular Automata Rules for Block Cipher in Cryptography

    Cellular Automaton is an idealized parallel processing machine which is an array (1-D, 2-D) of numbers or symbols called cell values together with an updating rule. A cell value is updated based on this updating rule, which involves the cell value as well as other cell values in a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Designing a Cryptosystem by Implementing Reversible Sequential Switching M/C - A Symmetric Key Approach

    This paper introduces an abstract model of reversible sequential machine in designing the cryptosystem based on the symmetric key approach. A reversible sequential machine is a one-to-one mapping old state and input to new state and output. Reversible computing machine is the mapping of old computational state to new computational...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol

    Security counts as a critical barrier to continuing growth of RFID industry due to lack of a proper high performance lightweight protocol-based solution. Amongst recent developments the Fast Lightweight Mutual Authentication Protocol (FLMAP) has been accepted for its superior speed and low complexity features. Here, the authors examine the security...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2010

    Semantic Learning and Web Image Mining With Image Recognition and Classification

    Image mining is more than just an extension of data mining to image domain. Web Image mining is a technique commonly used to extract knowledge directly from images on WWW. Since, main targets of conventional Web mining are numerical and textual data, Web mining for image data is on demand....

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2010

    Studying Security Issues in HPC (Super Computer) Environment

    HPC has evolved from being a buzzword to becoming one of the most exciting areas in the field of Information Technology & Computer Science. Organizations are increasingly looking to HPC to improve operational efficiency, reduce expenditure over time and improve the computational power. Using Super Computers hosted on a particular...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Development of Optical Character Recognition Software Package for Mobile Phones

    Optical Character Recognition (OCR) is a technique through which any textual information contained in images are extracted and converted into editable text format. The various OCR software packages which are available in desktop computer with scanner suffer from one primary constraint-MOBILITY. The authors have developed an OCR application for mobile...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Probabilistic Neural Network Based Approach for Handwritten Character Recognition

    In this paper, recognition system for totally unconstrained handwritten characters for south Indian language of Kannada is proposed. The proposed feature extraction technique is based on Fourier Transform and well known Principal Component Analysis (PCA). The system trains the appropriate frequency band images followed by PCA feature extraction scheme. For...

    Provided By Interscience Open Access Journals

  • White Papers // Aug 2010

    Time Domain Signal Detection for MIMO OFDM

    The MIMO techniques with OFDM is regarded as a promising solution for increasing data rates, for wireless access qualities of future wireless local area networks, fourth generation wireless communication systems, and for high capacity, as well as better performance. Hence as part of continued research, in this paper an attempt...

    Provided By Interscience Open Access Journals