Interscience Open Access Journals

Displaying 281-320 of 426 results

  • White Papers // Jan 2012

    Improving Software Modularity Using AOP

    Software modularity is a software design technique that increases the level to which software is composed of separate interchangeable components called modules. The modules are devised by breaking down the program functions. Each module accomplishes one function and contains all that is necessary to accomplish it. Modules represent a separation...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Model Based Software Development: Issues & Challenges

    One of the goals of software design is to model a system in such a way that it is easily understandable. Nowadays the tendency for software development is changing from manual coding to automatic code generation; it is becoming model-based. This is a response to the software crisis, in which...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Clustering Algorithms for High Dimensional Data - A Survey of Issues and Existing Approaches

    Clustering is the most prominent data mining technique used for grouping the data into clusters based on distance measures. With the advent growth of high dimensional data such as microarray gene expression data, and grouping high dimensional data into clusters will encounter the similarity between the objects in the full...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Requisite for Web Usage Mining - A Survey

    The World Wide Web (Web) has been providing an important and indispensable platform for receiving information and disseminating information as well as interacting with society on the Internet. With its astronomical growth over the past decade, the web becomes huge, diverse and dynamic. The application of data mining techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Software Inspection Improves Quality of Software Product

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the literature. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Secure E-Tendering Using Identity Based Encryption From Bilinear Pairings

    An electronic tender system (e-tender) streamlines the tender process and thereby saves time and cost. Security requirements for e-tendering systems have not been closely scrutinized in the paper. In addition to the security concerns of conventional e-tender systems - authentication, integrity, privacy, and non-repudiation are provided. This paper identifies key...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Implementation of RED Algorithm to Detect Malicious Packet Losses

    The authors consider the problem of detecting whether a compromised router is maliciously manipulating its stream of packets. In particular, they are concerned with a simple yet effective attack in which a router selectively drops packets destined for some victim. Unfortunately, it is quite challenging to attribute a missing packet...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Combined Two Step Approach for Detecting Input Validation Attacks Against Web Applications

    Internet becomes a part of the daily life. Almost very service by the internet will be provided with the help of web applications with these the people can say that without the web application they cannot do anything over the internet but at the same time web applications are mostly...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Intelligent Software Agent Applied To Digital Forensic and Its Usefulness

    Due to the large amount of information produced, accumulated, and distributed via electronic means, it is necessary for forensic experts during crime investigation to increase their abilities to search for important evidence in a timely manner because this is essential to the success of digital forensic examinations. The inadequacy of...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Flaws in Endair-A Secure Routing Protocol for MANETS

    Routing is the one of the essential criteria at network level in mobile ad hoc networks. Ad hoc network routing protocols are difficult to design, and secure because unable to handle rapid node mobility and network topology changes. It has been realized by many researchers, and several "Secure" routing protocols...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Application of Data Mining Using Bayesian Belief Network To Classify Quality of Web Services

    In this paper, the authors employed Na?ve Bayes, Augmented Na?ve Bayes, Tree Augmented Na?ve Bayes, Sons & Spouses, Markov Blanket, Augmented Markov Blanket, Semi Supervised and Bayesian network techniques to rank web services. The Bayesian Network is demonstrated on a dataset taken from literature. The dataset consists of 364 web...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Novel Steganographic Algorithm and Hashing to Improve Authentication Using Mobile Phones

    Security has become major issue in all online services. Strong authentication is provided conveniently using mobile phone as security token. While sending security token to user mobile via GSM network, it is vulnerable to several attacks. The authors can avoid them using Steganography which enforces the security of hashing algorithms....

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Role of Web Services in Migration of Legacy System to Service-Oriented Architecture

    Managing the convolution of systems is considered as a key confront in computing and is transact with numerous expansion projected at enhanced computerization. Service-Oriented Architectures (SOA) are predicted to facilitate the prerequisite of a large quantity of varied and contending web services which the potential users will be capable to...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2011

    A Modified Approach to the New Lossless Data Compression Method

    This paper proposed the modified approach to the new lossless data compression method. It is developed based on hiding data reversibly with a location map. It performs same as the earlier algorithm but it stands on lossless strategy where as the former approach could not do it. It can compress...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Min Max Normalization Based Data Perturbation Method for Privacy Protection

    Data mining system contain large amount of private and sensitive data such as healthcare, financial and criminal records. These private and sensitive data can not be share to every one, so privacy protection of data is required in data mining system for avoiding privacy leakage of data. Data perturbation is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A Soft Computing Platform for Minimizing the Bullwhip Effect

    An unmanaged supply chain is not inherently stable. The bullwhip effect occurs when the demand order variability's in the supply chain are amplified as they moved up the supply chain. Distorted information from one end of a supply chain to the other can lead to tremendous inefficiencies. In this paper...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Reduction of Context Switches Due to Task Synchronization in Uniprocessor and Multiprocessor Platform

    The problem of frequent context switches in multitasking is a real scheduling overhead which wastes extra CPU cycles, memory and causes much delay in scheduling. This paper focuses on reducing the context switches that result due to blocking when jobs are required to synchronize. The Priority Ceiling Protocol (PCP) is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Performance Analysis of ESPRIT Algorithm for Smart Antenna System

    ESPRIT is a high-resolution signal parameter estimation technique based on the translational invariance structure of a sensor array. The ESPRIT algorithm is an attractive solution to many parameter estimation problems due to its low computational cost. The performance of DOA using estimation signal parameter via a rotational invariant technique is...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Development of a Fuzzy Logic Based Software for Automation of a Single Pool Irrigation Canal

    A fuzzy logic based software for automation of a single pool irrigation canal is presented. Purpose of the software is to control downstream discharge and water level of the canal, by adjusting discharge release from the upstream end and upstream gate settings. The software is developed on a fuzzy control...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Multi-Gigabit Pattern for Data in Network Security

    In the current scenario network security is emerging the world. Matching large sets of patterns against an incoming stream of data is a fundamental task in several fields such as network security or computational biology. High-speed network Intrusion Detection Systems (IDS) rely on efficient pattern matching techniques to analyze the...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    VANET: Performance Comparison of BNGF Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a wireless ad hoc network that is formed between vehicles on an on demand basis. A lot of research work around the world is being conducted to design the routing protocols for VANETs. In this paper, the authors examine the significance Greedy Forwarding...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    GPS Based Bluetooth Broadcasting - Long Range Solution

    In this paper, GPS based Bluetooth broadcasting for long range is proposed. System model for Long range broadcasting of messages with multiple piconets and dynamically created threshold devices, based on GPS information is presented. The authors' simulation results have shown that, message can be received by those devices which are...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    A High Performance DDR3 SDRAM Controller

    The paper presents the implementation of compliant DDR3 memory controller. It discusses the overall architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks, the pipelining implemented in the design to increase the design throughput. It also discusses the advantages of DDR3 memories...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    EARM: An Efficient and Adaptive File Replication With Consistency Maintenance in P2P Systems

    In p2p systems, file replication and replica consistency maintenance are most widely used techniques for better system performance. Most of the file replication methods replicates file in all nodes or at two ends in a client-server query path or close to the server, leading to low replica utilization, produces unnecessary...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    Proposed Design for Circular Antenna and Half Ring Antenna for UWB Application

    In this paper, Ultra wideband planar circular patch and half circular ring patch antennas are proposed. These newly simulated structures are proposed for fabrication. The antennas are suitable for operating frequency of 7.5 GHz. It is shown that return loss of the both the antennas at 7.5 GHz is better...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2011

    MBER Space Time Equalization Assisted Multiuser Detection

    A novel Minimum Bit-Error Rate (MBER) Space-Time-Equalization (STE)-based Multi-User Detector (MUD) is proposed for multiple-receive-antenna-assisted space-division multiple-access systems. It is shown that the MBER-STE-aided MUD significantly outperforms the standard minimum mean-square error design in terms of the achievable Bit-Error Rate (BER). Adaptive implementations of the MBER STE are considered, and...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A New Implementation of Attribute Reduction Using Quick Relative Reduct Algorithm

    Knowledge discovery or data mining is the process of finding previously unknown and potentially interesting patterns and relations in large databases. The so-called \"Curse of dimensionality\" pertinent to many learning algorithms, denotes the drastic increase in computational complexity and classification error with data having a great number of dimensions. Beside...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Framework for Semantic Web Mining Model

    The web is transforming from a web of data to web services. This trend is provided to compose the services from existing services. Service mining framework is used to find the web services from existing services. This framework is a seven step process to find services but this model finds...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

    In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparisons Various Versions of GridFTP Protocols

    The GridFTP protocol has become a popular data movement tool used to build distributed grid-oriented applications. The GridFTP protocol extends the FTP protocol defined by and extended in some other IETF documents by adding certain features designed to improve the performance of data movement over a wide area network, to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Study of Artifical Intelligence in Intrusion Detection Systems

    Artificial Intelligence could make the use of Intrusion Detection Systems a lot easier than it is today. They could learn the preferences of the security officers and show the kind of alerts first that the officer has previously been most interested. As always, the hardest thing with learning AIs, is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Attack on E-Mail Encryption Protocols by Chosen Ciphertext Method

    Several security protocols (PGP, PEM, MOSS, S/MIME, PKCS#7, CMS, etc.) have been developed to provide confidentiality and authentication of electronic mail. These protocols are widely used and trusted for private communication over the Internet. The authors point out a potentially serious security hole in these protocols: any encrypted message can...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Extensive Simulation Analysis of AODV Protocol With IEEE 802.11 MAC for Chain Topology in MANET

    A Mobile Ad hoc NETwork (MANET) represents system of wireless mobile nodes that can self-organize freely and dynamically into arbitrary and temporary network topology. Routing is the task of directing data packets from a source node to a given destination. The main method for evaluating the performance of MANETs is...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Analysis of Complexities for finding efficient Association Rule Mining Algorithms

    Several algorithms for association rule mining, have been implemented including a variation of Apriori, an algorithm using hash functions for finding large 2-itemsets and 3-itemsets and direct search method for finding other large k-itemsets, and another variation of Eclat algorithm using perfect hash functions for 2-itemsets and 3-itemsets and the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Association Rule Mining Using Mapping on Frequent 1- itemsets

    The a priori algorithm for association rule mining is time consuming in the initial stages of the algorithm since usually large number of candidate itemsets is generated. To cope with this, several alternatives are suggested using hash functions. The authors provide a method to arrive at hash functions for 2-itemsets...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Comparatively Analysis of Fix and Dynamic Size Frequent Pattern Discovery Methods Using in Web Personalisation

    In this paper, the authors study and analysis of two methods of data mining. One is fix sized pattern discovery and second method dynamic size pattern discovery method. A fixed sized pattern discovery method is a prori method. Which is also called step by step frequent pattern mining. And variable...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Detection of Packet Losses by CRDP

    TCP has provided the primary means to transfer data reliably across the Internet; however, TCP has imposed limitations on several applications. Measurement and estimation of packet loss characteristics are challenging due to the relatively rare occurrence and typically short duration of packet loss episodes. While active probe tools are commonly...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Star Varietal Cube: A New Large Scale Parallel Interconnection Network

    This paper proposes a new interconnection network topology, called the Star varietal-cube SVC (n, m), for large scale multicomputer systems. The authors take advantage of the hierarchical structure of the Star graph network and the Varietal hypercube to obtain an efficient method for constructing the new topology. The Star graph...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks

    Intrusion Detection Systems are important for protecting network and its resources from illegal penetration. For 802.11network, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Design and Implementation of an Enhanced DDS Based Digital Modulator for Multiple Modulation Schemes

    This paper deals with the design & implementation of a Digital Modulator based on the FPGA. The design is implemented using the Enhanced Direct Digital Synthesis (DDS) Technology. The basic DDS architecture is enhanced with the minimum hardware to facilitate the complete system level support for different kinds of Modulations...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN

    Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Attacks in Wireless Networks

    Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are susceptible to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and critical issue. This paper presents recent advances...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    A Trust Based Sensor Protocol for Information Dissemination in a Point to Point Media

    Securing the information dissemination is an important issue in wireless sensor network. Previously, there is no available work on the integrated design of trust model and SPIN-PP protocol (sensor Protocols for Information via Negotiation) for information dissemination in wireless sensor networks. In this paper, to improve the quality of this...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

    A Wireless Sensor Network (WSN) is a collection of thousands of tiny sensor nodes having the capability of wireless communication, limited computation and sensing. Many data dissemination protocols have been proposed for multi-hop communication in sensor networks, each evaluated in some scenario. Many protocols are designed to exploit application requirements,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Localization in Wireless Sensor Network Using MDS

    In this paper, determining the localization of nodes in a Wireless Sensor Network is a very important task, which involves collaboration between sensor nodes. Localization is a fundamental service since it is relevant to many applications and to the network main functions, such as: routing, communication, cluster creation, network coverage,...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Effective Analysis of Different Parameters in Ad Hoc Network for Different Protocols

    A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    A Fuzzy Implementation of Biometrics With Five Factor Authentication System for Secured Banking

    Remote authentication is the most commonly used method to determine the identity of a remote client. Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Normalized Transfer of Bulk Data By Using UDP in Dedicated Networks

    High speed bulk data transfer is an important part of many data-intensive scientific applications. TCP fails for the transfer of large amounts of data over long distance across high-speed dedicated network links. Due to system hardware is incapable of saturating the bandwidths supported by the network and rise buffer overflow...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    End-to-End Delay Optimization in Wireless Sensor Network (WSN)

    In this paper, the authors are interested in optimizing the delay of event-driven wireless sensor networks, for which events does not occur frequently. In such systems, most of the energy is consumed when the radios are on, waiting for an arrival to occur. Sleep-wake scheduling is an effective mechanism to...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Performance Evaluation of Extended AODV Using Different Scenarios

    The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self configurability; flexibility and independence on any existing network infrastructure Mobile ad-hoc network have the attributes such as wireless connection, continuously changing topology, distributed operation and ease of deployment....

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Development of Empirical Mode Decomposition

    In this paper, one of the tasks for which empirical mode decomposition is potentially useful is nonparametric signal denoising, an area for which wavelet thresholding has been the dominant technique for many years. In this paper, the wavelet thresholding principle is used in the decomposition modes resulting from applying EMD...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    QoS Routing in Mobile Ad-Hoc Networks Using Agents

    Quality of Service (QoS) provisioning in a Mobile Ad-hoc NETwork (MANETs) routing for multimedia traffic is a challenging task due to dynamic topology of such networks. Fuzzy Logic (FL) was used for QoS prediction from current uncertain QoS constraints in the network for particular applications, from these uncertain constraints there...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services

    Wireless broadcast is an effective approach to disseminate data to a number of users. To provide secure access to data in wireless broadcast services, symmetric key - based encryption is used to ensure that only users who own the valid keys can decrypt the data. Regarding various subscriptions, an efficient...

    Provided By Interscience Open Access Journals

  • White Papers // May 2012

    Quality of Service Based Handover Approach in a WLAN Network

    As the technology is improving so are the demands of end users and their applications increasing. A wide variety of new applications are being invented daily. These applications have different demands from the underlying network protocol suite. High bandwidth internet connectivity has become a basic requirement to the success of...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    A Review of Open Source Software and Open Source Movement in Developing Countries

    Open-source software abbreviated as OSS is computer software that is available with source code and is provided under a software license that permits users to study, change, and improve the software. For the commercial software the source code and certain other rights are normally reserved for copyright holders, i.e., the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Effective Method of Age Dependent Face Recognition

    This Automatic age dependent face recognition system is developed. This approach is based on the Principle Component Analysis (PCA). Eigen face approach is used for both age prediction and face recognition. Face database is created by aging groups individually. The age prediction is carried out by projecting a new face...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Model Based Approach to Prevent SQL Injection Attacks on .NET Applications

    Web applications support static and dynamic queries to access the database. Dynamic queries take input from the user and use that input to form the query. A user can give malicious input to the application which results in an incorrect query or an unauthorized query and performs vulnerable action on...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Tree Based Aggregation and Routing in WSN: A Multi-Agent System Approach

    In WSN one of the issues is to route the data from the sensor nodes to sink node. The tree-based approach provides an efficient solution for establishing the path and in network aggregation. Tree is nonlinear structures, which have hierarchical levels in terms of parent-child combination. In this paper, the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Mathematical Model for the Detection of Selfish Nodes in MANETs

    A mobile ad hoc network, is an independent network of mobile devices connected by wireless links. Each device in a MANET can move freely in any direction, and will therefore change its links to other devices easily. Each must forward traffic of others, and therefore be called a router. The...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    The Application of Case-Based Reasoning to Estimation of Software Development Effort

    Accurate project effort estimation is an important goal for the software engineering community. Till date most work has focused upon building algorithmic models of effort estimation for example COCOMO. The authors describe an alternative approach to estimation based upon the use of analogy. The objective is to estimate the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Concept of Embedded 'C': Review

    The use of C language to program micro controllers is becoming too common. And most of the time its not easy to build an application in assembly which instead one can make easily in C. So, its important that one know C language for micro controller which is commonly known...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Fast and Texture-Structure Preservable Inpainting and Its Application for Creating Virtualized-Reality Indoor Models

    This paper discusses the new inpainting algorithm for handling the images in the virtualized-reality indoor models. The untextured regions in the indoor model are textured by this proposed inpainting method which guarantees the texture and the structure propagation. The authors call this as a hybrid method because it combines the...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Defending Against Modern Threats in Web Applications

    Web applications have become critical part of business. They hold a treasure trove of data behind their front ends. Now-a-days attackers are well aware of the valuable information accessible through web applications, so website security has become a major problem today. The number of vulnerabilities has multiplied in recent years....

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Software Performance Analysis With Parallel Programming Approaches

    The term Software Performance Engineering (SPE) is a systematic and quantitative approach for constructing software systems to meet the performance objectives such as response time, throughput, scalability and resource utilization. Optimization is major concern in achieving performance parameters. Optimization is performed during run-time, or in the design phase. This paper...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Cloud Computing in Distributed System

    Cloud Computing as an Internet-based computing; where resources, software and information are provided to computers on-demand, like a public utility; is emerging as a platform for sharing resources like infrastructure, software and various applications. The majority of cloud computing infrastructure consists of reliable services delivered through data centers and built...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Choosing a Technique for Digital Signatures From the Customers' Perspective

    One way to secure identity over the Internet and other channels is to use digital signatures. Since this area is often used in contact with banks, the authors have during their work co-operated with Nordea IT. In order for customers to use a digital signature whenever they wish to, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Approaches for Improving the Performance of Snort Intrusion Detection Systems

    The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as Intrusion Detection Systems (IDS). In this paper the architecture of the snort which is an open source Intrusion detection system is explained. It is a rule based...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Intrusion Detection System Using Genetic Algorithm and Data Mining: An Overview

    Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology used by them. Modern IDS have complex requirements. With data integrity, confidentiality and availability, they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment

    Resource provisioning is important issue in cloud computing and in the environment of heterogeneous clouds. The private cloud with confidentiality data configure according to users need. But the scalability of the private cloud limited. If the resources private clouds are busy in fulfilling other requests then new request cannot be...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Security Analysis of Cloud Computing

    Cloud computing play an important role in IT industry. Cloud computing reshaping the IT industry and in software development process. Cloud computing techniques can offer many facilities like sharing of hardware, availability of software and many more resources as a basic need. Cloud computing effectively reduces the cost, maintenance. As...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Research on Data Mining Using Neural Networks

    The application of neural networks in the data mining has become wider. Data mining is the search for relationships and global patterns that exist in large databases but are 'Hidden' among the vast amount of data, such as a relationship between patient data and their medical diagnosis. These relationships represent...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Basic Model of Multicast Authentication Based On Batch Signature-MABS

    Traditional multicast authentication schemes manage the different involvement of the receivers by letting the sender: choose the block size, divide a multicast stream into blocks, connect each block with a signature, and spread the effect of the Signature across all the packets in the block. The relationship between packets tends...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Cross-Layer System for Cluster Based Data Access in MANET'S

    The objective of cooperative caching is to improve data availability, improve access efficiency and reduce query delay in mobile Ad-Hoc networks. Many types of cache replacement algorithms like LRU, LFU, LFRU, LRU-MIN and LFU-MIN are used to improve data accessibility and reduce query delay in cluster based cooperative caching in...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    The Mathematical Analysis of Column Oriented Database

    There are two obvious ways to map a two-dimension relational database table onto a one-dimensional storage interface: store the table row-by-row, or store the table column-by-column. Historically, database system implementations and research have focused on the row-by row data layout, since it performs best on the most common application for...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Cloud Computing Applications and Security Issues: An Analytical Survey

    Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Data Warehousing Applications: An Analytical Tool for Decision Support System

    Data-driven decision support systems, such as data warehouses can serve the requirement of extraction of information from more than one subject area. Data warehouses standardize the data across the organization so as to have a single view of information. Data Warehouses (DW) can provide the information required by the decision...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Improving Spam Email Filtering Efficiency Using Bayesian Backward Approach Project

    Unethical e-mail senders bear little or no cost for mass distribution of messages; yet normal e-mail users are forced to spend time and effort in reading undesirable messages from their mailboxes. Due to the rapid increase of electronic mail (or e-mail), several people and companies found it an easy way...

    Provided By Interscience Open Access Journals