IRD India

Displaying 1-40 of 310 results

  • White Papers // Jun 2015

    Mining With Big Data Using HACE

    With a fast growth of networking, streaming, data storage and its collection capacity, big data are now unfolding fastly in all fields of science, medical, engineering, politics, entertainment, social media etc. with all this autonomous sources having complex and evolving relationships between the, heterogeneous data is accumulated, this is a...

    Provided By IRD India

  • White Papers // Jun 2015

    Proactive Source Routing Protocol for Mobile Ad Hoc Networks Using BFST Algorithm

    Opportunistic data forwarding has drawn much attention in the research community of multihop wireless networking, with most research conducted for stationary wireless networks. One of the reasons why opportunistic data forwarding has not been widely utilized in Mobile Ad hoc NETworks (MANETs) is the lack of an efficient lightweight proactive...

    Provided By IRD India

  • White Papers // Jun 2015

    GSM Based Fuel Theft Detector Using Microcontroller

    In this paper, the authors have focused on developing an enhancement of the vehicle alarm security system via SMS. The system will manipulate a mobile phone to send SMS. Even though the SMS can be sent using the features available in the mobile, the objective of this experiment is to...

    Provided By IRD India

  • White Papers // May 2015

    Design of High Throughput AXI Compliant DDR3 Controller

    In this paper, the authors describe the implementation of AXI compliant DDR3 memory controller. It discusses the overall architecture of the DDR3 controller along with the detailed design and operation of its individual sub blocks, the pipelining implemented in the design to increase the design throughput. It also discusses the...

    Provided By IRD India

  • White Papers // May 2015

    Automatic Saline Level Monitoring System Using Microcontroller ATMEGA 328

    In this paper, the authors propose an automatic, low cost saline level measurement system using microcontroller ATMEGA 328.The main building blocks of the proposed system are microcontroller ATMEGA 328, Bluetooth module and IR sensors. The system contains two LEDs. The status of the saline can be given in two forms...

    Provided By IRD India

  • White Papers // May 2015

    Controller Area Network to Ethernet Conversion Using Raspberry Pi

    Controller Area Network (CAN) and Ethernet both use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as a media access control method. Beyond that, the CAN protocol is based on CSMA/ CD/AMP (Carrier-Sense Multiple Access/Collision Detection with Arbitration on Message Priority) protocol. Due to CSMA/CD in Ethernet as soon as...

    Provided By IRD India

  • White Papers // May 2015

    A Survey on Shortest Path Estimation Using RDBMS Over Graph

    Recently with the advancement of social networking sites vast amount of data emerges out, which is usually in the form of graph data. Many graph search queries are in use to access and retrieve this data. Shortest path computation is required in many applications for their faster execution and can...

    Provided By IRD India

  • White Papers // May 2015

    On Clouds the Authentication of Data Storage Using Decentralized Access Control by Unidentified Way

    The authors propose the secure data storage in clouds for a new decentralized access. The cloud verifies the authenticity of the series without knowing the user's identity in the proposed scheme. Their feature is that only valid users can able to decrypt the stored information. It prevents from the replay...

    Provided By IRD India

  • White Papers // May 2015

    On the Utilization Aspect of Document Data for Mining the Side Information

    In text mining applications, side-information is also available along with the text documents. This side-information can be like document provenance information, links existing inside the document, web logs based on user-access behavior, or non-textual attributes which exist in the text document. Such attributes will contain remarkable amount of information for...

    Provided By IRD India

  • White Papers // May 2015

    Design and Implementation of Spartan 6 Series FPGA Board and Application of PID Controller for Robots

    The Spartan-6 family of field-programmable gate arrays is one of the latest devices and specifically designed to meet the needs of high volume, cost-sensitive consumer electronic applications. The thirteen-member family offers densities ranging from 3,840 to 147,443 logic cells and system gates. The Spartan-6 family builds on the success of...

    Provided By IRD India

  • White Papers // May 2015

    A Novel Approach for Implementation of AES Algorithm on NOC

    Network-on-Chip (NoC) is the scalable platform where billion transistors have been integrated on to a single chip. NoC architecture is an mxn mesh of processing elements where resources are placed on the slots formed by the switches. Each switch is connected to one resource and four neighboring switches, and each...

    Provided By IRD India

  • White Papers // May 2015

    Analysis of Harmonics in Five Phase Inverter Drive with Double Tuned Filter Using Simulink/LATLAB

    The advancement in present technologies high speed electronics is generates unwanted harmonics in the line voltages and currents. Mitigation of harmonics is the present challenge and the best solution is to implement with the filters. This paper presents the design of double tuned filter to reduce the voltage/current harmonics produced...

    Provided By IRD India

  • White Papers // May 2015

    Fault Tolerant Linear State Machine Design Approach for Safety Critical Systems Implemented on FPGA

    In this paper, the authors propose a new method for the design of fault tolerant linear state machines with initial state 0 and one dimensional input and one-dimensional output. It is shown that the LFSR-implementation of the transfer function of a linear automaton can be utilized to correct transient errors...

    Provided By IRD India

  • White Papers // May 2015

    A Modified Switching Median Filter Using Fuzzy Logic

    Digital images get corrupted by impulse noise when acquired by a defective sensor or when transmitted through a faulty channel. This paper presents a new Fuzzy Switching Median (FSM) filter employing fuzzy techniques in image processing. This filter is able to remove salt-and-pepper noise in digital images while preserving image...

    Provided By IRD India

  • White Papers // May 2015

    Sustainable HR: A Need for a Sustainable Enterprise

    In status quo the word "Sustainability" is a commonly used word. It's a challenge for everyone everywhere beginning from environment to economy. But, the modern competitive and globalized business world has expanded the meaning and the value of sustainability. This paper represents the role of human capital and its management...

    Provided By IRD India

  • White Papers // Apr 2015

    Design and Implementation of Secured Data Embedding Method using Quick-Response Code and COLOR LSB

    Steganography is the study of concealing the reality in the data which the users are sending. The objective of steganography is to implant a mystery message inside a bit of unsusceptible data. The consequence of steganography relies on upon the mystery of the cover carrier. After the steganographic bearer is...

    Provided By IRD India

  • White Papers // Apr 2015

    An Efficient String-Join Architecture Using Map-Reduce Approach

    The string relationship join, that happens to identify similar string-pairs from string-sets, gets comprehensive interest in DataBase (DB) and data retrieval programs. For this challenge, the refine and filter structure is typically implemented by the existent investigation work initially and then different streaming techniques have also been proposed. In the...

    Provided By IRD India

  • White Papers // Apr 2015

    Document Clustering using K-Medoids

    People are always in search of matters for which they are prone to use internet, but again it has huge assemblage of data due to which it becomes difficult for the reader to get the most accurate data. To make it easier for people to gather accurate data, similar information...

    Provided By IRD India

  • White Papers // Mar 2015

    Establishing Secure Mining of Item Set in a Databases that is Dispersed Horizontally

    The authors propose transaction databases where the user requirements changes accordingly. The association is for predict the user needs with the given data. Before, there were some algorithms which are fast and not secure one, another set of algorithm which has a security based protocol but the processing time is...

    Provided By IRD India

  • White Papers // Mar 2015

    Data Mining with Big Data: A Survey

    Big data is a new term for a large and complicated data set that it becomes difficult to process using a traditional data management tools. Big data are now growing rapidly in all science and engineering domains, including biological, physical and bio-medical sciences. Big data mining is the art of...

    Provided By IRD India

  • White Papers // Mar 2015

    Effective Secure Multi-Keyword Top-K Retrieval Over Relational Databases

    Keyword has emerging as a promising pattern for data outsourcing and high-quality data services. However, concerns of sensitive information on potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable Symmetric Encryption (SSE) allows retrieval of encrypted data. In this...

    Provided By IRD India

  • White Papers // Mar 2015

    Parallel Mining of High Utility Itemsets From Large Transactional Databases

    In this paper, the authors generate the high utility (profitable) item sets in a parallel environment, by considering the both profit and quantity of each item. The parallel mining of high utility item sets will take very less time than mining with the single system over large number of transactions....

    Provided By IRD India

  • White Papers // Mar 2015

    Robust Traffic Congestion Reduction Strategies, Through Public Networking in Android Smart Phone

    The randomly and frequently disorder of public population growing enable the traffic congestion and that is root cause of evolution and generation of traffic congestion. It is evaluated and can effect in transport planning decision. It is being found that various factors that enables congestion cost, estimates and the evaluation...

    Provided By IRD India

  • White Papers // Mar 2015

    Improved Software Development Effort Estimation Based on Four Fuzzy Logic Functions

    The systems and software development industry is characterized by a paradigm of project failure. One of the known contributing causes of these project failures is poor requirements engineering and management, which has been repeatedly and widely discussed and documented. But there are other factors also like poor software project management...

    Provided By IRD India

  • White Papers // Mar 2015

    Semantic Based String Matching Algorithm for Mining Service Information

    Web crawlers are one of the most crucial components used by the search engines to collect pages from the Web. It is an intelligent means of browsing used by the search engine. The requirement of a web crawler that downloads most relevant web pages from such a large web is...

    Provided By IRD India

  • White Papers // Mar 2015

    Accurate Results on Shared Memory Multi-Core Processors

    As days are passing, technology is taking its force towards its smartness. But, there are some devices which are to be modified for better accurate results. Parallel processing is the simultaneous use of more than one CPU or processor core to execute a program or multiple computational threads. Ideally, parallel...

    Provided By IRD India

  • White Papers // Mar 2015

    Graphene Based Transistor: G-FET

    It has come to a time, when the search beyond silicon for using it in transistors has gained serious importance. If the researcher's prediction is to be substantiated in today's world, then a post silicon age in the semi-conductor industry is to be ushered soon. In this paper, graphene-derived nano-materials...

    Provided By IRD India

  • White Papers // Mar 2015

    Design of Fast Multipliers Using Vedic Mathematics

    Vedic mathematics is the ancient mathematics which has unique technique of mental calculation with help of simple rules and principles based on 16 sutras. Urdhava-Tiryagbhyam sutra is one among the 16 sutra in Vedic mathematics. Urdhava-Tiryagbhyam multiplier provides high speed and regularity in layout or even combination of them. Binary...

    Provided By IRD India

  • White Papers // Feb 2015

    16-Bit Low Power Booth Encoded Multiplier Design Using GDI CMOS Logic

    Gate Diffusion Input (GDI) a new technique of designing a low-power digital combinational circuit is described. The technique allows reducing power consumption, propagation delay and area of digital circuits while maintaining low complexity of logic design. The GDI approach allows implementation of a wide range of complex logic functions using...

    Provided By IRD India

  • White Papers // Feb 2015

    Data Anonymization Technique for Privacy Preservation on Mapreduce Framework

    Cloud computing is a revolutionary computing approach, which provides massive storage and computational capability. Cloud computing is a computing paradigm which enables flexible, on-demand and low cost usage of resources. These advantage, are the causes of privacy and security issues, which arises because data owned by different users are stored...

    Provided By IRD India

  • White Papers // Feb 2015

    Wireless Residential Lighting Control and Home Security for Real Time Application

    In the current global scenario, remote lighting control is one of the challenges in residential buildings. Using GSM modem and RF communication for controlling lights through mobile phone and remote control respectively and inclusion of motion sensors to the wireless lighting control network enables intelligent lighting solutions unleashing great benefits...

    Provided By IRD India

  • White Papers // Feb 2015

    One to Many Data Linkage Using One Class Clustering Tree

    In many domains one-to-many data linkage is an essential task, however, many of the publications have not addressed this paper. Traditionally, data linkage is performed among the entities of similar type, however, developing linkage techniques that link between matching entities of different types is also very important. In this paper,...

    Provided By IRD India

  • White Papers // Feb 2015

    Enhance Image using Dynamic Histogram and Data Hiding Technique

    The inconspicuous world of technology the task of secure data transfer stood futile. There are many ways to make data secure with the processing techniques. The data is insinuated in a host and converted using encryption methods for further transfer. The host medium is mutated using some principles of alteration...

    Provided By IRD India

  • White Papers // Jan 2015

    Design of Low Power Digital CMOS Comparator

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The Comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Dec 2014

    Project Management- Is It Managing Technical Skills or Human Skills?

    With the fast changing world and technological developments, project management as a science and art has developed by leaps and bounds. This paper aims to study what are the skills required by a manager to be an excellent project manager. The human skills are analyzed to know its elements. The...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of 4X4 Vedic Multiplier Using Power Gating Method

    In this paper, the authors propose a various multipliers implemented using CMOS logic style and their comparative analysis on the basis of power and PDP (Power Delay Product). A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively...

    Provided By IRD India

  • White Papers // Dec 2014

    Delay Redundant Multi Operand Adder Using Cyclic Combinational Method

    In this paper, the authors propose the efficient implementation of multioperand redundant compressor trees in modern FPGAs by using their fast carry resources. Their approaches strongly reduce delay and they generally present no area overhead compared to a CPA tree. Moreover, they could be defined at a high level based...

    Provided By IRD India

  • White Papers // Dec 2014

    Dynamic Resource Scheduling & Monitoring in Cloud Computing

    Cloud computing allows clients to range upwards and downwards their resource convention based on requirements. Many of cloud versions come from resources multiplexing by using virtualization technology. To decrease energy wastage by idle server, the traditional way is to keep a server to sleep throughout unused period, with a alternative...

    Provided By IRD India

  • White Papers // Dec 2014

    Robust Node Clone Detection in Arbitrary Wireless Networks

    Wireless networks have an impact of responsiveness in ancient times as a result of their wide variety of vicinity. In general, WSNs include 100s or even 1000s of inexpensive, source constrained, scattered sensor nodes, which frequently spread within the scrutiny vicinity arbitrarily. Consider process upbringing is poor, protection mechanisms are...

    Provided By IRD India

  • White Papers // Dec 2014

    A Novel Design of All Digital Phase Locked Loop for VLSI Applications

    The design of the ADPLL must intend to have a phase detection system with higher phase accuracy for minimum phase error. The need for All Digital Phase Locked Loop (ADPLL) was required basically because the microprocessors do not have enough processing power at such high frequencies even though with integrated...

    Provided By IRD India

  • White Papers // Dec 2012

    Border Gateway Protocol - A Best Performance Protocol When Used for External Routing Than Internal Routing

    The paper addresses the interoperability issues between Internal Border Gateway Protocol (IBGP) over other Interior Gateway Protocols (IGPs) by knowing the characteristics of the respective protocols and also studies the efficiency of External Border Gateway Protocol (EBGP) as an Exterior Gateway Protocol (EGP). Furthermore, it shows how IGRP proves to...

    Provided By IRD India

  • White Papers // Jun 2013

    Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks

    Using multiple channels over single channel the performance can be significantly increased since the use of multiple channels can reduce interference influence. Channel assignment is one of the most basic and major concern in such networks. By effectively utilizing multiple non overlapping channels and multiple interfaces, collision and co-channel interference...

    Provided By IRD India

  • White Papers // Jun 2013

    3 Dimensional Security in Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. So it is emerging field...

    Provided By IRD India

  • White Papers // Jun 2013

    To Implement SaaS Multitenant Framework Security in Cloud Computing

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By IRD India

  • White Papers // Apr 2013

    Enriching Mobile Multimedia Applications Using Cloud Mobile Media

    Cloud Mobile Gaming (CMG), an approach that enables rich multiplayer Internet games on mobile devices, where compute intensive tasks like graphic rendering are executed on cloud servers in response to gaming commands on a mobile device, and the resulting video has to be streamed back to the mobile device in...

    Provided By IRD India

  • White Papers // Apr 2013

    Articulate Features for Mobile-Social TV System Using Cloud Computing

    The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services. In this paper, Articulate Features for Mobile-Social TV System using Cloud Computing (CloudMoV) is proposed. This system effectively utilizes...

    Provided By IRD India

  • White Papers // May 2013

    Analytical Survey Model on Consumption of Cloud Service Models

    A new paradigm of computing is evolved that is cloud computing where word cloud is used as an allegory for the internet. The incarnation of this technology forces the organizations to rapidly shifting their IT systems from traditional client/server to cloud computing model where everything is offered as a service...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of 128 Bit Key Rc5 Cipher

    In this paper, the authors present the design of RC5 algorithm and its physical design implementation. The RC5 cryptographic algorithm is widely used in wireless communication networks like WSAN and WBSN. RC5 is a fast block cipher, developed by RSA security, which exploits data rotation to achieve a high level...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of Multi-Threaded Pipelined Aes Crypto Processor

    In this paper, the authors present AES algorithm implementation using multi-threaded and pipelining concept for faster data encryption and its physical implementation using 40nm technology. AES crypto-algorithm is widely used in secured wireless communications, zigbee, Electronic financial transactions, content protection, digital rights, set-top boxes etc. The AES algorithm is symmetric...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

    Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes connected to each other without any central administrator. Nodes can move from one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly....

    Provided By IRD India

  • White Papers // Aug 2013

    Hybrid Technique for Human Identification Using Information Theory

    Humans can be individualized based on their facial characteristics. However, identifying a face becomes a challenging task due to the complexities involved. The Visual models of face include many parameters. In this paper different algorithms and parameters are studied and computed for real time results. The combined PCA and geometric...

    Provided By IRD India

  • White Papers // Aug 2013

    Outlier Detection for Large Datasets

    Finding outlier or anomaly in large dataset is an important problem in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional athletes. The identification of outliers can lead to the discovery of truly unexpected knowledge. LOF (Local Outlier Factor) is a classical...

    Provided By IRD India

  • White Papers // Aug 2013

    Live Virtual Machine Migration Based on Cow Checkpointing Using XEN Hypervisor

    Live Virtual Machine (VM) migration usually involves migrating physical memory image, the network connections and virtual device state. Live migration has been proposed to reduce the downtime of migrating the virtual machine from host to destination by encountering pre-copy approach. If dirty memory generation is high, it takes long time...

    Provided By IRD India

  • White Papers // Aug 2013

    Predictable Testing of Phishing Websites Based on Deportment Model Approach

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. An attacker might generate...

    Provided By IRD India

  • White Papers // Jul 2012

    Null Direction Propagation of Antennas and Counter Measures in Tactical High Frequency Sky Wave Communication

    In tactical High Frequency (HF) communication, sky wave and ground wave mode establish the radio link. There is a phenomenon by which antenna in ground wave mode communicates with antenna in sky wave mode. This happens due to emission of radio waves in the NULL direction. This emission can be...

    Provided By IRD India

  • White Papers // Jul 2012

    High Throughput Lossless Data Compression Algorithm

    Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Data compression offers an attractive approach to reducing communication costs by using available bandwidth effectively. Though this scheme has clear benefits, the execution time of compression and decompression is critical to its application in...

    Provided By IRD India

  • White Papers // Jul 2012

    Achieving Privacy Preservation Schemas Against Traffic Analysis in Multi-Hop Wireless Networks

    Privacy threat is one of the critical issues in multihop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to thwart these attacks since the coding/mixing operation is encouraged...

    Provided By IRD India

  • White Papers // Jul 2012

    Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System

    Data storage and transmission, task scheduling, and network construction used for that. The authors have proposed a clustering algorithm to find the group relationships for query and data aggregation efficiency. This paper are as follows: First, since the clustering algorithm itself is a centralized algorithm, in this paper, they further...

    Provided By IRD India

  • White Papers // Oct 2012

    BgpAND - Architecting a Modular BGP4 Attack & Anomalies Detection Platform

    Border Gateway Protocol (BGP) is an Autonomous System (AS) routing protocol. It forms the backbone of Internet core routing decisions. However, it is also equally prone to security issues and several attempts to attack & exploit the protocol have been noted. bgpAND is a platform designed and developed to analyze...

    Provided By IRD India

  • White Papers // Oct 2012

    Safer Data Transmission Using Steganography

    Today's Internet connected networks are under permanent attack by intruders and hackers. The explosive growth of computer systems and their interconnections has led to a heightened awareness of the need to protect the data transmitted. There are many ways already existing and also discovered daily. The field of cryptography has...

    Provided By IRD India

  • White Papers // Oct 2012

    A Scheme for Key Revocation in Wireless Sensor Networks

    Key revocation is a challenging task in wireless sensor networks. There can be many nodes in a sensor network sharing the same key(s) in their key ring. If any of those nodes in the network gets compromised then the keys of those nodes having same keys will also be revealed....

    Provided By IRD India

  • White Papers // Nov 2012

    Parallel Data Mining and Assurance Service Model Using Hadoop in Cloud

    In the information industry, huge amount of data is widely available and there is an imminent need for turning such data into useful information. This need is fulfilled by the process of exploration and analysis, by automatic or semi-automatic means, of large quantities of data provided by Data Mining. In...

    Provided By IRD India

  • White Papers // Dec 2012

    Multiple Trust in Trust-Based On-Demand Routing in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworking is concept of communication, which means a communication temporary network without any form of centralized administration. Every node in this network acts both as host and a router to forward packets for other node. Due to the absence of the centralized administration, MANETs are easily attacked by...

    Provided By IRD India

  • White Papers // Dec 2012

    A High Speed Frequency Based Multimodal Biometric System Using Iris and Fingerprint

    In this paper, the authors adopt a unified viewpoint to extract singular points (core and delta) that determine the topological structure and largely influence the orientation field by using the principal of Gabor basis functions. Lastly the points are classified into classes by method of Poincare index for Fingerprint classification....

    Provided By IRD India

  • White Papers // Jul 2012

    Traffic Management Through Inter-Communication Between Cars Using VANET System

    Vehicular Ad-hoc NETwork (VANET) basically used to provide various services to its user. Misbehaviour of such system should be defended. VANET system provides the intercommunication between the vehicles by letting them exchange the traffic information. Such kind of exchanges may create privacy apprehension since the vehicle-generated information can contain much...

    Provided By IRD India

  • White Papers // Oct 2013

    A Review of Cloud Computing and Security Issues at Different Levels in Cloud Computing

    Cloud computing is one of exciting technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for computer processes. Cloud computing can be viewed as different things to different people and its elastic nature makes it suitable to any organization. Cloud computing can do...

    Provided By IRD India

  • White Papers // Apr 2013

    Detection and Prevention of Web Application Security Attacks

    Today's Web applications can contain dangerous security flaws. The global distribution of these applications makes them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. Research reports indicate that more than 80 percent of the web applications are vulnerable to security threats. User friendly web applications...

    Provided By IRD India

  • White Papers // Apr 2013

    A Ranking Based Approach in Security Alert for Handling Sensitive Data Organization

    An organization undoubtedly wants to preserve and retain data stored in an organization's computers. On the other hand, this data is necessary for daily work processes. Users within the organization's perimeter (e.g., employees, subcontractors, or partners) perform various actions on this data (e.g., query, report, and search) and may be...

    Provided By IRD India

  • White Papers // Apr 2013

    Credit Card Endorsement using Biometrics in Cloud Computing

    This application focused on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transaction but there is no security measures to verify whether the user is authenticated or...

    Provided By IRD India

  • White Papers // Aug 2013

    Envisaging Roles for Access Security

    Access Control is the principle process of enterprise risk and Security Management. Role Based Access Control (RBAC) is the model for effective management of risk arises in safeguarding three important features of security Secrecy, Integrity and no Denial of Service (DoS). This paper addresses the new approach called \"Role visualization\"...

    Provided By IRD India

  • White Papers // Sep 2013

    Data Security for Unreliable Clouds Using Reliable Encryption

    Data Security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud. The risk of malicious insiders in the cloud and the failure of cloud services have received a great deal of attention by companies. This...

    Provided By IRD India

  • White Papers // Jul 2013

    Pair Hand: A Pairing-Based Cryptography to Secure Handover Process

    Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs and are subject to a few security attacks. Further, a novel handover authentication protocol...

    Provided By IRD India

  • White Papers // Jul 2013

    Development of CGI Based Front End for Implementation of Security Policies and Application Layer Filtering

    A system with vulnerabilities in operating system and installed software which are connected to internet are liable to attacks from the outside world as the outermost protecting layer firewall will not block all the attacks .So a second layer of protection can be built at the host level to prevent...

    Provided By IRD India

  • White Papers // Apr 2013

    Reversible Steganographic Technique Based on IWT for Enhanced Security

    Steganography is used to hide a secret message within a cover image, thereby yielding a stego image such that even the trace of the presence of secret information is wiped out. The purpose of steganography is to maintain secret communication between two users. Steganography has several technical challenges namely high...

    Provided By IRD India

  • White Papers // Jun 2013

    Three-Dimensional Password Generation Technique for Accessing Cloud Services

    Cloud computing refers to the use and access of multiple server-based computational re-sources via a digital network (WAN, Internet connection using the World Wide Web, etc.). To utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password authentication can be done in...

    Provided By IRD India

  • White Papers // Nov 2012

    Selective Encryption Algorithm for Wireless Ad-hoc Networks

    Security is one of the most challenging aspects in the internet and network applications. Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is...

    Provided By IRD India

  • White Papers // Nov 2013

    The Survey on Security for Smart Dust

    Smart dust motes, as networked computing devices continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due...

    Provided By IRD India

  • White Papers // Jul 2013

    Wi-Fi Infrastructure Security System from Vulnerable Attacks

    Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

    Provided By IRD India

  • White Papers // Jun 2013

    Secured Modified Bloom's Based Q-Composite Key Distribution for Wireless Sensor Networks

    The security issue in a Wireless Sensor Network (WSN) has been drawing considerable research attention in recent years. However Key management, a basic security service, becomes the core design for various security services, such as encryption and authentication. To increase the connectivity of each key in a large-scale WSN and...

    Provided By IRD India

  • White Papers // Nov 2013

    Mitigating Cloud Virtualization Vulnerabilities

    The main idea of cloud computing is to build a virtualized computing resource pool by centralizing abundant computing resources connected with network and present the service of infrastructure, platform and software. Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its infinite benefits. However,...

    Provided By IRD India