Interscience Open Access Journals

Displaying 321-360 of 426 results

  • White Papers // Jul 2011

    Detection of Phishing Websites and Secure Transactions

    Phishing is an electronic online identity theft in which the attackers use a combination of social engineering and web site spoofing techniques to trick a user into revealing confidential information. It steals the user's personal identity data and financial credentials. Most of the phishing attacks emerge as spoofed E-Mails appearing...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Integrated Approach of Malicious Website Detection

    With the advent and the rising popularity of Internet, security is becoming one of the focal point. At present, Web sites have become the attacker's main target. The attackers uses the strategy of embedding the HTML tags, the script tag to include web-based Trojan scripting or redirector scripting, the embedded...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Implementation of Botnet Detection Algorithm for Grid Networks

    Grid is an emerging technology that aims at utilizing resources efficiently and effectively, A botnet is a collection of infected computers and the common attacks are a Distributed Denial Of Service attack (DDOS) is any type of attack on a networking structure to disable a server from servicing its clients....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Embedded Wireless Based Communications in Oilfield & Providing Security System

    The area of the oilfield is much wider. Oil exhauster continuous working for 24 hours. As the problem of petroleum being stolen, transmission line being stolen, and transformer being stolen exists which requires the strong secures management system. With Consideration of the objective condition restriction of geographical environment, the implementation...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Comparative Study on Privacy Preserving Association Rule Mining Algorithms

    The field of privacy has seen rapid advances in recent years because of the increases in the ability to store data. In particular, recent advances in the data mining field have lead to increased concerns about privacy. Privacy-preserving data mining has been studied extensively, because of the wide proliferation of...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Combining Retrieval With Ontology Browsing

    The Semantic Web provides a way to encode information and knowledge on web pages in a form that is easier for computers to understand and process. For Semantic Web documents to have an impact, they will have to be compatible with Web based indexing and retrieval. There are techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Improving Routing Efficiency Based on Random Direction Mobility Model in Manets

    Major issue arising in Mobile Ad hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. A method that has been advocated to improve routing efficiency is to select the most stable path so as to reduce the latency and the overhead due to re-routing instability...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN

    Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Attacks in Wireless Networks

    Communications in wireless networks has been facilitating numerous emerging applications that require packet delivery from one or more senders to multiple receivers. Communications are susceptible to various kinds of attacks due to insecure wireless channels. Communications in wireless networks remains a challenging and critical issue. This paper presents recent advances...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Effective Method of Age Dependent Face Recognition

    This Automatic age dependent face recognition system is developed. This approach is based on the Principle Component Analysis (PCA). Eigen face approach is used for both age prediction and face recognition. Face database is created by aging groups individually. The age prediction is carried out by projecting a new face...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Model Based Approach to Prevent SQL Injection Attacks on .NET Applications

    Web applications support static and dynamic queries to access the database. Dynamic queries take input from the user and use that input to form the query. A user can give malicious input to the application which results in an incorrect query or an unauthorized query and performs vulnerable action on...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Regression Testing by Computing Coverage Data for Software Evolution

    Software systems is evolve continuously during development and maintenance. After software is modified regression testing is applied to software to ensure that It behaves intended and modifications not negatively impacts its original functionality. It is time consuming to rerun test suite T of program Pi on modified program Pi+1. So,...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Comparison of Rule Based Classification Algorithms

    Classification based on Predictive Association Rules (CPAR) is a kind of association classification methods which combines the advantages of both associative classification and traditional rule-based classification. For rule generation, CPAR is more efficient than traditional rule-based classification because much repeated calculation is avoided and multiple literals can be selected to...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Selection of Optimal Discount of Retail Assortments with Data Mining Approach

    Recently, the capabilities of generating and collecting data have been increasing rapidly. Widespread use of bar codes for most commercial products, the computerization of many business, and the advance in data collection tools have provided the users with huge amount of retail data. This explosive growth in data and databases...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A System for Outlier Detection of High Dimensional Data

    In high dimensional data large no of outliers are embedded in low dimensional subspaces known as projected outliers, but most of existing outlier detection techniques are unable to find these projected outliers, because these methods perform detection of abnormal patterns in full data space. So, outlier detection in high dimensional...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Authenticated Connection establishment in Web Applications using Steganography

    A web application is an application that is accessed over a network such as the Internet or an intranet. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. The ability to update...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Review on Main Memory Database

    The idea of using Main Memory DataBase (MMDB) as physical memory is not new but is in existence quite since a decade. MMDB have evolved from a period when they were only used for caching or in high-speed data systems to a time now in twenty first century when they...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Thread Pool Based Service Tracking Manager

    The Service Tracking Manager (STM) application is a management software that integrates, collects, and manages alerts/events information from Casino Management Systems. It allows casinos to track alerts and events at different locations. Casinos staff attends to various kinds of requests. The requests can be for providing customer service, handle events...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Analysis of Secured Synchronous Stream Ciphers

    The new information and communication technologies require adequate security. In the past decades, the authors have witnessed an explosive growth of the digital storage and communication of data, triggered by some important breakthroughs such as the Internet and the expansive growth of wireless communications. In the world of cryptography, stream...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Group-Key Management Model for Worldwide Wireless Mesh Networks

    Wireless Mesh Network (WMN) is an upcoming wireless network technology and is mainly used to provide broadband internet in remote locations. It is characterized by minimum fixed infrastructure requirement and is operated in an open medium, such that any user within the range covered by mesh routers may access the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Secure Biometric Cryptosystem for Distributed System

    Information (biometric) security is concerned with the assurance of confidentiality, integrity, and availability of information in all forms, biometric information is very sophisticated in terms of all, in this paper, the authors are focusing on data pattern along with all security assurance, so that they can improve the matching performance...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Novel Approach for Privacy Preserving in Video Using Extended Euclidean Algorithm Based on Chinese Remainder Theorem

    The development in the modern technology paved a path in the utilization of surveillance cameras in streets, offices and other areas but this significantly leads a threat to the privacy of visitors, passengers or employees, leakage of information etc.. To overcome this threat, privacy and security needs to be incorporated...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Efficient Approach Formulation of Social Groups of User Calls of GSM

    The people are living in a world of wireless technology. The most widely used wireless i.e. mobile computing device today is the Mobile phone, can be used not only for voice and data communications but also as a computing device running context aware applications. In this paper, the authors present...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Designing of an Automated Power Meter Reading With Zigbee Communication

    This paper presents the design and implementation of Automatic Power Meter (APM), The APM is implemented using an ARM and Zigbee Based power meter Communication Module. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Using an APM with...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Extending UML for Multidimensional Modeling in Data Warehouse

    Multidimensional modeling is the foundation of data warehouses, MD databases, and On-Line Analytical Processing (OLAP) applications. Nowadays Dimensional modeling and object-orientation are becoming growing interest areas. In the past few years; there have been many proposals, for representing the MD properties at the conceptual level. However, none of them has...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Performance Comparison of IACO,AODV Networking Routing Protocols

    There are several standard protocols for Mobile Ad hoc NETworks (MANET) that have been developed for devices with higher computing features. The Efficient routing protocols can provide significant benefits to mobile ad hoc networks, in terms of both performance and reliability. Many routing protocols for such networks have been proposed...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Effective Time Management Schema in WSNs

    WSN usually consists of a large number of resource constraint sensor nodes that are generally deployed in unattended/hostile environments and Existing security designs mostly provide a hop-by-hop security paradigm. Furthermore, existing security designs are also vulnerable to many types of Denial of Service (DoS) attacks, such as random node capture...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Periodically Updating the Content in Mobile Ad Hoc Network With Secured Synchronization

    The content and presence updates were used to transmit updates to nearby nodes over an ad hoc network using duty cycles; the authors' algorithms synchronize the transmissions of nodes periodically. By this approach, nodes can save battery power without missing updates from their neighbours by switching off their network cards....

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    An Improvement of Centroid Algorithm Based on Distance in Wireless Sensor Network

    In Wireless Sensor Network (WSN), estimating the exact position of sensor node is an important research problem and its location accuracy impacts the efficiency of localization algorithms. In this paper improved centroid range free localization method is proposed and comparison with conventional centroid is done by varying different parameters such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Audio Streaming Over Low Data Rate Wireless System

    Audio applications over wireless networks have recently emerged as a promising research field. However, the limits in terms of communication bandwidth and transmission power have withstood the design of low-power embedded nodes for audio communication. In this paper, the authors describe the implementation details of an embedded system for the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Wireless Testing Tool for Wireless Routers

    Wireless test tool is a powerful tool for wireless network monitor and analyzer for 802.11 a/b/g/n networks. Loaded with many user-friendly features, Wireless test tool for Wi-Fi combines performance and flexibility with an ease of use in the industry. Wireless test tool for Wi-Fi captures every packet on the air...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    False Data Detection in Wireless Sensor Network With Secure Communication

    The security of wireless sensor networks is a challenging problem in the process of data aggregation. As data are send though sensor network confidentiality plays and important role between sink and destination. An efficient secure data aggregation is proposed to enhance the data security of wireless sensor networks. In wireless...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Dynamic Transmission Power Assignment for Energy Conservation Routing in MANETs

    Wireless networks are formed by the devices that run on batteries, having limited amount of energy. Different actions of the nodes like transmitting, receiving, processing etc consume available energy. In order to increase the system's life-time, energy consumption has to be minimized. The Power Assignment Minimum Expected Energy and Reliable...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Reliable Routings in Networks With Generalized Link Failure Events

    Traditional methods for ensuring reliable transmissions in circuit-switched networks rely on the pre computation of a backup path for every working path or for every network link. These methods work fine as long as the network experiences only single link failures. They do not guarantee undisturbed communication, however, in the...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Object Detection Using Am-Fm Features

    This paper presents a template-based approach to detect objects of interest from real images. The authors rely on AM-FM models and specifically, on the Dominant Component Analysis (DCA) for feature extraction. They incorporate the results from AM-FM models for object detection. In order to detect the object of interest from...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Mobile Communication

    Consumers demand more from their technology. Whether it be a television, cellular phone, or refrigerator, the latest technology purchase must have new features. With the advent of the Internet, the most-wanted feature is better, faster access to information. Cellular subscribers pay extra on top of their basic bills for such...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Role of Feature Selection in Intrusion Detection Systems for 802.11 Networks

    Intrusion Detection Systems are important for protecting network and its resources from illegal penetration. For 802.11network, the features used for training and testing the intrusion detection systems consist of basic information related to the TCP/IP header, with no considerable attention to the features associated with lower level protocol frames. The...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    Design and Implementation of an Enhanced DDS Based Digital Modulator for Multiple Modulation Schemes

    This paper deals with the design & implementation of a Digital Modulator based on the FPGA. The design is implemented using the Enhanced Direct Digital Synthesis (DDS) Technology. The basic DDS architecture is enhanced with the minimum hardware to facilitate the complete system level support for different kinds of Modulations...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Review of Some Transaction Models Used in Mobile Databases

    Mobile computing is presently experiencing a period of unprecedented growth with the convergence of communication and computing capabilities of mobile phones and personal digital assistant. However, mobile computing presents many inherent problems that lead to poor network connectivity. To overcome poor connectivity and reduce cost, mobile clients are forced to...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2011

    Soft Computing Approach to Automatic Test Pattern Generation for Sequential Vlsi Circuit

    Due to the constant development in the integrated circuits, the automatic test pattern generation problem become more vital for sequential VLSI circuits in these days. Also testing of integrating circuits and systems has become a difficult problem. In this paper, the authors have discussed the problem of the automatic test...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    A Comparative Analysis of Ecdsa V/S Rsa Algorithm

    Elliptic curve cryptography with its various protocols implemented in terms of accuracy and fast observation of results for better security solution. ECC applied on two finite fields: prime field and binary field. Because it is public key cryptography so, it also focuses on generation of elliptic curve and shows why...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    An Integration Approach for Heterogeneous Distributed Database Transaction Protocols

    Integration is commonly used for summarizing information held in very large databases which are encountered in data warehousing, large scale transaction management, and statistical databases. Such applications often involve distributed databases that have developed independently and therefore may exhibit incompatibility, heterogeneity, and data inconsistency. The authors are here concerned with...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Fuzzy Set Approaches to Data Mining of Association Rule

    Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association rules provide information in accessing significant correlations in large...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Graphical Authentication Using Region Based Graphical Password

    Password authentication is failing as an authentication since it increases the user burden to remember the passwords. Graphical authentication is proposed as an alternative for textual passwords since it may be easy for users to remember. In this paper the authors propose a new image region selection based graphical password...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Testing Process Overview Exploration for a Software Product in a Large Software Development Project

    Software testing is a process where the user have the stated requirements, pre-requisite software that is to be installed and the configuration of the machine that need to be done as per the test data for the test case and for a specific platform which when verified works perfectly. This...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    A Fuzzy Based Divide and Conquer Algorithm for Feature Selection in KDD Intrusion Detection Dataset

    In this paper the authors provide a fuzzy logic based divide and conquer algorithm for feature selection and reduction among large feature set of KDD intrusion detection data set, since a reduced feature set will help to evolve better mining rules. This algorithm introduces a fuzzy idea of dividing the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Efficient Allocation of Virtual Machine in Cloud Computing Environment

    Cloud computing is a latest new computing paradigm where applications, data and IT services are provided over the internet. Computing service is provided on demand as a utility as other utilities. Cloud computing provides dynamic provisioning of computing services. Resource scheduling is a key process for clouds such as infrastructure...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Dynamic Detection of Design Inconsistency During Software Development Using Daid Approach

    Evolution of software has lead to the fast growth of technology whose impact can be witnessed in all the domains of scientific and engineering applications. Hence engineering high quality software is one of the core challenges of all IT industries. The software models which are being used for the development...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2007

    Classification and Prediction in Customer Relationship Management Using Back Propagation

    Customer relationship management provides a customer classification and prediction which is used for the optimization of business process. The classification and prediction which is used for the optimization of business process. This classification and prediction in CRM will help the company to study, analyze and forecast customer's pattern of consumption,...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Clustering Algorithms for High Dimensional Data - A Survey of Issues and Existing Approaches

    Clustering is the most prominent data mining technique used for grouping the data into clusters based on distance measures. With the advent growth of high dimensional data such as microarray gene expression data, and grouping high dimensional data into clusters will encounter the similarity between the objects in the full...

    Provided By Interscience Open Access Journals

  • White Papers // Jan 2012

    Requisite for Web Usage Mining - A Survey

    The World Wide Web (Web) has been providing an important and indispensable platform for receiving information and disseminating information as well as interacting with society on the Internet. With its astronomical growth over the past decade, the web becomes huge, diverse and dynamic. The application of data mining techniques to...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    A Perspective Approach on Citizen Card System - Applicability and Opportunity

    Citizen card system in which every citizen of a country will have a unique 16 digit number citizen card system which would not just help the government track down individuals, but would make life far easier for citizens as they would not have to submit multiple documents each time they...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Interactive Database System

    With the revolution in the technology and lifestyle of human race, the need of easy life and faster result in the need of an hour. Due to complex life and fast growing technology it is always desired to obtain results for any query, problem or requirement with the speed of...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2012

    Various Network Used Radio Frequency Identification Techniques and its Frequency Ranges

    Now-a-days, there are various technologies used in day-to-day life; such as human computer interaction, communication engineering, various types of architectures of computer system for easy convenience of living life style of human being. However, there are various network utilized for the transmission of signal containing various data like audio, video,...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Optimization Through Bayesian Classification on the k-Anonymized Data

    Privacy preserving in data mining & publishing, plays a major role in today networked world. It is important to preserve the privacy of the vital information corresponding to a data set. This process can be achieved by k-anonymization solution for classification. Along with the privacy preserving using anonymization, yielding the...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    A Mark Based Indexing Method for Well Organized Data Retrieval of Comparative Temporal Patterns

    So many numbers of algorithms have been proposed for the discovery of data from the large database. However, since the number of generated patterns can be large, selecting which patterns to analyze can be nontrivial. There is thus a need for algorithms and tools that can assist in the selection...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Study on Improvement in RSA Algorithm and its Implementation

    The network security means to protect data during their transmission over channel of networks similarly internet security also to protect data during their transmission over a collection of interconnected networks in all over the world. Cryptography is the way of hiding information during transmission over a cannel. There are lots...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Vulnerability Assessment and Penetration Testing

    In this modern world, all of the persons are using the facility of internet. Security is one of the major issues of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A New Implementation of Attribute Reduction Using Quick Relative Reduct Algorithm

    Knowledge discovery or data mining is the process of finding previously unknown and potentially interesting patterns and relations in large databases. The so-called \"Curse of dimensionality\" pertinent to many learning algorithms, denotes the drastic increase in computational complexity and classification error with data having a great number of dimensions. Beside...

    Provided By Interscience Open Access Journals

  • White Papers // Jul 2011

    A Framework for Semantic Web Mining Model

    The web is transforming from a web of data to web services. This trend is provided to compose the services from existing services. Service mining framework is used to find the web services from existing services. This framework is a seven step process to find services but this model finds...

    Provided By Interscience Open Access Journals

  • White Papers // May 2013

    Blackbox Testing of Web Service

    Web services and Service Oriented Computing (SOC) paradigm have received significant attention due to its wide spread adoption and promotion by major IT vendors. As more and more service-oriented softwares are built today testing of web service have becomes crucial point. Web services are distributed, loosly coupled, autonomous, re-usuable, discoverable,...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Ontology Techniques for Web Data

    In this paper the authors presents techniques for knowledge description and formalization, ontologies are used to represent user profiles in personalized web data. However, when representing user profiles, many models or techniques have utilized only knowledge from either a global knowledge base or user local information. In this paper, a...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Face Recognition by Linear Discriminant Analysis

    Linear Discriminant Analysis (LDA) has been successfully applied to face recognition which is based on a linear projection from the image space to a low dimensional space by maximizing the between class scatter and minimizing the within-class scatter. LDA allows objective evaluation of the significance of visual information in different...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Intrusion Detection for Discrete Sequences

    Global understanding of the sequence anomaly detection problem and how techniques proposed for different domains relate to each other. The authors' specific contributions are as follows: they identify three distinct formulations of the anomaly detection problem, and review techniques from many disparate and disconnected domains that address each of these...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Attack Against Anonymity Using Cell Counting

    Various low-latency anonymous communication systems such as Tor and Anonymizer have been designed to provide anonymity service for users. In order to hide the communication of users, most of the anonymity systems pack the application data into equal-sized cells. Via extensive experiments on Tor, the authors found that the size...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Entity Extraction Using Statistical Methods Using Interactive Knowledge Mining Framework

    There are various kinds of valuable semantic information about real-world entities embedded in web pages and databases. Extracting and integrating these entity information from the Web is of great significance. Comparing to traditional information extraction problems, web entity extraction needs to solve several new challenges to fully take advantage of...

    Provided By Interscience Open Access Journals

  • White Papers // Sep 2013

    Minimization of Mobile Ad Hoc Networks Routing Attacks Using Ds Mathematical Theory

    Mobile Ad-hoc NETworks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. Even though there exist several intrusions response techniques to mitigate such critical...

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Analysis of Facial Marks to Distinguish Between Identical Twins Using Novel Method

    Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. The biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another....

    Provided By Interscience Open Access Journals

  • White Papers // Oct 2013

    Effective Event Derivation of Uncertain Events in Rule-Based Systems

    There is a growing need for systems that react automatically to events. While some events are generated externally and deliver data across distributed systems, others need to be derived by the system itself based on available information. Unpredictability of future events which influence the outcome of the present decisions but...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Carrier Frequency Offset Estimation Algorithm in the Presence of I/Q Imbalance in OFDM Systems

    In this paper, the authors analyzed the feasibility of using a virtual carrier based carrier frequency offset estimation algorithm in the presence of I/Q imbalance in OFDM systems. Based on the analysis of the signal model with both receiver CFO and I/Q imbalance impairment they conclude that it is feasible...

    Provided By Interscience Open Access Journals

  • White Papers // Feb 2012

    Embedded Automobile Engine Locking System, Using GSM Technology

    This paper deals with the design & development of an embedded system, which is being used to prevent/control the theft of a vehicle. The developed instrument is an embedded system based on GSM technology. The instrument is installed in the engine of the vehicle. An interfacing GSM modem is also...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    New Improved Algorithm for Mining Privacy - Preserving Frequent Itemsets

    Due to the increasing use of very large databases and data warehouses, mining useful information and helpful knowledge from transactions is evolving into an important research area. Frequent Itemsets (FI) Mining is one of the most researched areas of data mining. In order to mining privacy preserving frequent itemsets on...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Virtual Fabrication and Analog Performance of Sub-40nm Bulk MOSFET Using TCAD TOOL

    The Scaling of MOSFET device to sub40nm is very critical because of short channel effect. The SCE is mainly due to power supply since scaling of device is more rapid as compared to The scaling of supply voltage result is the SCE, because of high electric field degrades the mobility...

    Provided By Interscience Open Access Journals

  • White Papers // Mar 2011

    A Real Time ZigBee Based Locating System

    An Adhoc networks is a self organized and distributed entity, consisting of n Mobile Stations (MSs) without the coordination of any centralized access point. Initialization is one of the fundamental tasks to set up an adhoc network, which involves assigning of each of the n MSs a distinct ID number...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Mathematics in Internet Traffic Data Analysis

    The Internet traffic data have been found to possess extreme variability and bursty structures in a wide range of time-scales, so that there is no definite duration of busy or silent periods. But there is a self-similarity for which it is possible to characterize the data. The self-similar nature was...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2011

    Software Reusable Components With Repository System

    Software reuse is the process of creating software systems from existing software rather than building them from scratch. The goal is the use of reusable components as building blocks in new systems with modifications occurring in a controlled way. The reuse of software components is the key to improve productivity...

    Provided By Interscience Open Access Journals

  • White Papers // Dec 2012

    Detecting and Effective Routing of Time Critical Events Using Congestion and Delay Aware Routing in WSNS

    Reliability and timeliness are two essential requirements of successful detection of critical events n Wireless Sensor Networks (WSNs). The Base Station (BS) is particularly interested about reliable and timely collection of data sent by the nodes close to the ongoing event, and at that time, the data sent by other...

    Provided By Interscience Open Access Journals

  • White Papers // Apr 2013

    Transmission Network Expansion with Transmission Loading Relief

    Transmission planning should seek to maintain or improve system security over time and facilitate robust wholesale power markets by improving transmission capacity for bulk power transfers across wide regions It includes finding the optimal plan for the electrical system expansion, it must specify the transmission lines and/or transformers that should...

    Provided By Interscience Open Access Journals

  • White Papers // Nov 2012

    Gesture Based Touchpad Security System with Design of Touch Screen Controller

    In this paper, the authors present a new approach on the design of security systems by using a touch sensitive device. Security is a permanent concern in a variety of environments ranging from physical access restriction in home and industrial settings to information security in digital systems. Numeric passwords, fingerprint...

    Provided By Interscience Open Access Journals

  • White Papers // Jun 2013

    Detection of Data Leakage

    Sometimes sensitive data must be handed over to supposedly trust third parties. With the extensive application of database systems, the owners of the databases have urgent requirements to protect their copyright of databases. Some of the data is leaked and found in an unauthorized place the distributor must assess the...

    Provided By Interscience Open Access Journals