Karpagam University

Displaying 1-25 of 25 results

  • White Papers // Apr 2014

    Certain Investigation on Missing Value Imputation Techniques

    Missing values can cause incorrect conclusions about data. Correspondingly, substitution of the missing values may introduce inaccuracies and irregularity. In the final result, a data value missing is the main drawback. Due to this problem, the system performance has the highest error rate in other words it degrades the system...

    Provided By Karpagam University

  • White Papers // Dec 2013

    A Puzzle Based Authentication Scheme for Cloud Computing

    Cloud computing is emerging technology which consists of existing techniques combined with new technology paradigms. This paper presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user...

    Provided By Karpagam University

  • White Papers // May 2013

    An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that can has no fixed or predetermined topology, with mobile nodes and dynamic membership changes. A self-organizing network is a network that can automatically extend, change, configure and optimize its topology, coverage, capacity, cell size, and channel allocation, based...

    Provided By Karpagam University

  • White Papers // Mar 2013

    An Efficient Fingerprint Denoiser for Fingerprint Recognition

    Fingerprint identification is one of the oldest and popularly used forms of biometric identification system. Fingerprint image quality is of much importance to achieve high performance in Automatic Fingerprint Identification System (AFIS). Most of the fingerprint Recognition system relies on fingerprint ridges to extract the features. The fingerprint images which...

    Provided By Karpagam University

  • White Papers // Jan 2013

    Secure Multiparty Electronic Payments in Mobile Computing

    As Mobile communications become increasingly sophisticated and ubiquitous .traditional mobile billing with its implicit trust relationships Will no longer be adequate .with a large number of different sizes mobile Networks, a huge variety of value added service provider and many millions Of roaming user, it is desirable to remove any...

    Provided By Karpagam University

  • White Papers // Nov 2012

    Mobility Scenario of Dissimilar Mobility Models using the DSR Protocol in Ad-hoc Sensor Network- A Survey

    The mobility model used emulates closely the real-life Scenarios. The mobility model dictates the movement of nodes and plays an important role in determining the protocol and connectivity of these nodes. The authors describe several mobility models that represent mobile nodes whose movements are independent of each other (i.e. Entity...

    Provided By Karpagam University

  • White Papers // Sep 2012

    An Enhanced Approach for Treating Missing Value Using Boosted K-NN

    Knowledge Discovery in Dataset (KDD) plays a vital role in information analysis and retrieval based applications. Quality of data is the most indispensable component of KDD. The factor which affects the quality of datasets is presence of missing values. The data collected from the real world often contains serious data...

    Provided By Karpagam University

  • White Papers // Sep 2012

    Load Shedding Using Window Aggregation Queries on Data Streams

    The processes of extracting knowledge structures for continuous, rapid records are known as the Data Stream Mining. The main issue in stream mining is handling streams of elements delivered rapidly which makes it infeasible to store everything in active storage. To overcome this problem of handling voluminous data the authors...

    Provided By Karpagam University

  • White Papers // Sep 2012

    An Enhanced Code Encryption Approach with HNT Transformations for Software Security

    Security threats such as viruses, worms, trojans and spyware affects the security and authentication of software codes, forcing software developers to build security schemes for better software protection. These software threats exploit the authenticated data of the software and confidentiality, integrity and accessibility is greatly affected by these software threats....

    Provided By Karpagam University

  • White Papers // Aug 2012

    Content Aware Retargeting of Stego Images

    Images play a vital role in steganography, as cover media to hide secret messages. Retargeting becomes mandatory while transmitting image in a heterogeneous network because sender and recipient may not have display devices of same resolution. Resizing images by scaling or cropping also lead to loss of visually important features....

    Provided By Karpagam University

  • White Papers // Aug 2012

    Secured Power Aware Routing Protocol (SPARP) for Wireless Sensor Networks

    Several wireless sensor network applications ought to decide the intrinsic variance between energy efficient communication and the requirement to attain preferred Quality of Service (QoS) such as packet delivery ratio, delay and to reduce the power consumption of wireless sensor nodes. Also the intended protocols that are developed aims in...

    Provided By Karpagam University

  • White Papers // Aug 2012

    Estimation of Evolutionary Optimization Algorithm for Association Rule Using Spatial Data Mining

    The innovative process for spatial data is more risk when compared to relational data. This can be functional for the efficiency and effectiveness of algorithms as well as the difficulty of possible patterns that can be establish in a spatial database. To optimize the rules generated by Association Rule Mining...

    Provided By Karpagam University

  • White Papers // Jul 2012

    Anomaly Detection and Elimination Algorithm for RFID Data

    The RFID technology has penetrated into all the sectors like supply chain automation, asset tracking, medical/Health Care applications, people tracking, Manufacturing, Retail, Warehouses, Livestock Timing and the healthcare sector due to its increased functionality, low cost, high reliability and easy-to-use capabilities. RFID system produces data that are unreliable, low-level, and...

    Provided By Karpagam University

  • White Papers // Jun 2012

    CMR-FD: Clustered Multipath Routing With False Destination to Increase the Lifetime of Sensor Network

    Routing in wireless sensor network is an important task. This has led to number of routing protocol which utilizes the limited resources. Since wireless sensors are powered by batteries, it is very essential to utilize their energy. Under these constraints many methods for conserving the power have been proposed to...

    Provided By Karpagam University

  • White Papers // Mar 2012

    High Performance Computing Network for Cloud Environment Using Simulators

    Cloud computing is the next generation computing. Adopting the cloud computing is like signing up new form of a website. The GUI which controls the cloud computing make is directly control the hardware resource and user application. The difficulty part in cloud computing is to deploy in real environment. Its'...

    Provided By Karpagam University

  • White Papers // Dec 2011

    Image Restoration Using CPN and SOM

    This paper mainly deals with the restoration of an image degraded by the Impulsive noise, Speckle noise and Gaussian noise. Two types of networks are used to restore the image they are Counter Propagation Networks (CPN) and Self-Organizing Maps (SOM). The parameters in the weight controller are adjustable using learning...

    Provided By Karpagam University

  • White Papers // Jul 2011

    An Evaluation of Fingerprint Security Using Noninvertible Biohash

    Biometric analysis for identifying verification is becoming a widespread reality. It is a very challenging and tedious task to develop a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining decent performance. Cancellable biometrics is one of the best methods used to resolve this problem. In this...

    Provided By Karpagam University

  • White Papers // May 2011

    Applying RFID Technology to Construct an Elegant Hospital Environment

    Radio Frequency IDentification (RFID) technology has seen increasing adoption rates in applications that range from supply chain management, asset tracking, Medical/Health Care applications, People tracking, Manufacturing, Retail, Warehouses, and Livestock Timing. Of these, Medical/Health care applications are of more importance because minute errors in it can cost heavy financial and...

    Provided By Karpagam University

  • White Papers // May 2011

    A Recent Survey on Knowledge Discovery in Spatial Data Mining

    Spatial data mining is the process of discovering, motivating and previously unknown, but potentially helpful patterns from large spatial datasets. Extracting interesting and useful patterns from spatial datasets is more tricky than extracting the parallel patterns from established numeric and definite data due to the complexity of spatial data types,...

    Provided By Karpagam University

  • White Papers // Apr 2011

    Location Discovery With Security in Wireless Sensor Network

    Localization is one of the supporting technologies in wireless sensor networks. To identify the exact location of each and every sensor may not be feasible. In most of the sensor network application gathered by sensor will be meaningless without the location of sensor nodes. The researchers involve identifying localization of...

    Provided By Karpagam University

  • White Papers // Apr 2011

    Multiple Sink Based Compressive Data Aggregation Technique for Wireless Sensor Network

    In a wireless sensor network, the single sink based data aggregation technique leads to inefficiency due to imbalance in energy consumption. Moreover it induces scalability problems and overload at the sink, since it is a "Many to one" pattern. Hence, in this paper, the authors develop a multiple sink based...

    Provided By Karpagam University

  • White Papers // Mar 2011

    Lossy Image Compression for Multi Application Smart Card

    A single multi application smart card can be used to replace the various cards people now carry for use in public transport, e.g. driving license, health insurance cards, national identity cards, etc. Important challenges in the implementation and deployment of multi application smart cards are the protection of privacy of...

    Provided By Karpagam University

  • White Papers // Feb 2011

    Transaction Encoding Algorithm (TEA) for Distributed Data

    Analysis of huge datasets has been a major concern in almost all areas of technology in the past decade and the role of data mining has become so crucial as a result of this crisis. As the data sizes in these datasets increase, from gigabytes to terabytes or even larger...

    Provided By Karpagam University

  • White Papers // Dec 2010

    Energy Efficient PCP Protocol for K-Coverage in Sensor Networks

    Wireless sensor networks are networks used to collect an environmental information in an area using sensor nodes with low power. The sensors sense various information in different ways. So the sensors are expected to have different sensing models. Probabilistic Coverage Protocol (PCP) that can employ different sensing models. In this...

    Provided By Karpagam University

  • White Papers // Dec 2010

    A Cost Effective Compressive Data Aggregation Technique for Wireless Sensor Networks

    In Wireless Sensor Network (WSN) there are two main problems in employing conventional compression techniques. The compression performance depends on the organization of the routes for a larger extent. The efficiency of an in-network data compression scheme is not solely determined by the compression ratio, but also depends on the...

    Provided By Karpagam University

  • White Papers // Jun 2012

    CMR-FD: Clustered Multipath Routing With False Destination to Increase the Lifetime of Sensor Network

    Routing in wireless sensor network is an important task. This has led to number of routing protocol which utilizes the limited resources. Since wireless sensors are powered by batteries, it is very essential to utilize their energy. Under these constraints many methods for conserving the power have been proposed to...

    Provided By Karpagam University

  • White Papers // Mar 2013

    An Efficient Fingerprint Denoiser for Fingerprint Recognition

    Fingerprint identification is one of the oldest and popularly used forms of biometric identification system. Fingerprint image quality is of much importance to achieve high performance in Automatic Fingerprint Identification System (AFIS). Most of the fingerprint Recognition system relies on fingerprint ridges to extract the features. The fingerprint images which...

    Provided By Karpagam University

  • White Papers // May 2013

    An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks

    A Mobile Ad-hoc NETwork (MANET) is a collection of mobile nodes that can has no fixed or predetermined topology, with mobile nodes and dynamic membership changes. A self-organizing network is a network that can automatically extend, change, configure and optimize its topology, coverage, capacity, cell size, and channel allocation, based...

    Provided By Karpagam University

  • White Papers // Jan 2013

    Secure Multiparty Electronic Payments in Mobile Computing

    As Mobile communications become increasingly sophisticated and ubiquitous .traditional mobile billing with its implicit trust relationships Will no longer be adequate .with a large number of different sizes mobile Networks, a huge variety of value added service provider and many millions Of roaming user, it is desirable to remove any...

    Provided By Karpagam University

  • White Papers // Dec 2013

    A Puzzle Based Authentication Scheme for Cloud Computing

    Cloud computing is emerging technology which consists of existing techniques combined with new technology paradigms. This paper presents puzzle based authentication scheme in which cloud user registers and solves the puzzle, puzzle solving time and sequence of image block is stored and validated by local server and the cloud user...

    Provided By Karpagam University

  • White Papers // Dec 2010

    A Cost Effective Compressive Data Aggregation Technique for Wireless Sensor Networks

    In Wireless Sensor Network (WSN) there are two main problems in employing conventional compression techniques. The compression performance depends on the organization of the routes for a larger extent. The efficiency of an in-network data compression scheme is not solely determined by the compression ratio, but also depends on the...

    Provided By Karpagam University

  • White Papers // Apr 2011

    Multiple Sink Based Compressive Data Aggregation Technique for Wireless Sensor Network

    In a wireless sensor network, the single sink based data aggregation technique leads to inefficiency due to imbalance in energy consumption. Moreover it induces scalability problems and overload at the sink, since it is a "Many to one" pattern. Hence, in this paper, the authors develop a multiple sink based...

    Provided By Karpagam University

  • White Papers // May 2011

    Applying RFID Technology to Construct an Elegant Hospital Environment

    Radio Frequency IDentification (RFID) technology has seen increasing adoption rates in applications that range from supply chain management, asset tracking, Medical/Health Care applications, People tracking, Manufacturing, Retail, Warehouses, and Livestock Timing. Of these, Medical/Health care applications are of more importance because minute errors in it can cost heavy financial and...

    Provided By Karpagam University

  • White Papers // May 2011

    A Recent Survey on Knowledge Discovery in Spatial Data Mining

    Spatial data mining is the process of discovering, motivating and previously unknown, but potentially helpful patterns from large spatial datasets. Extracting interesting and useful patterns from spatial datasets is more tricky than extracting the parallel patterns from established numeric and definite data due to the complexity of spatial data types,...

    Provided By Karpagam University

  • White Papers // Feb 2011

    Transaction Encoding Algorithm (TEA) for Distributed Data

    Analysis of huge datasets has been a major concern in almost all areas of technology in the past decade and the role of data mining has become so crucial as a result of this crisis. As the data sizes in these datasets increase, from gigabytes to terabytes or even larger...

    Provided By Karpagam University

  • White Papers // Mar 2011

    Lossy Image Compression for Multi Application Smart Card

    A single multi application smart card can be used to replace the various cards people now carry for use in public transport, e.g. driving license, health insurance cards, national identity cards, etc. Important challenges in the implementation and deployment of multi application smart cards are the protection of privacy of...

    Provided By Karpagam University

  • White Papers // Apr 2011

    Location Discovery With Security in Wireless Sensor Network

    Localization is one of the supporting technologies in wireless sensor networks. To identify the exact location of each and every sensor may not be feasible. In most of the sensor network application gathered by sensor will be meaningless without the location of sensor nodes. The researchers involve identifying localization of...

    Provided By Karpagam University

  • White Papers // Dec 2010

    Energy Efficient PCP Protocol for K-Coverage in Sensor Networks

    Wireless sensor networks are networks used to collect an environmental information in an area using sensor nodes with low power. The sensors sense various information in different ways. So the sensors are expected to have different sensing models. Probabilistic Coverage Protocol (PCP) that can employ different sensing models. In this...

    Provided By Karpagam University

  • White Papers // Jul 2011

    An Evaluation of Fingerprint Security Using Noninvertible Biohash

    Biometric analysis for identifying verification is becoming a widespread reality. It is a very challenging and tedious task to develop a biometric template protection scheme which is anonymous, revocable and noninvertible while maintaining decent performance. Cancellable biometrics is one of the best methods used to resolve this problem. In this...

    Provided By Karpagam University

  • White Papers // Dec 2011

    Image Restoration Using CPN and SOM

    This paper mainly deals with the restoration of an image degraded by the Impulsive noise, Speckle noise and Gaussian noise. Two types of networks are used to restore the image they are Counter Propagation Networks (CPN) and Self-Organizing Maps (SOM). The parameters in the weight controller are adjustable using learning...

    Provided By Karpagam University

  • White Papers // Mar 2012

    High Performance Computing Network for Cloud Environment Using Simulators

    Cloud computing is the next generation computing. Adopting the cloud computing is like signing up new form of a website. The GUI which controls the cloud computing make is directly control the hardware resource and user application. The difficulty part in cloud computing is to deploy in real environment. Its'...

    Provided By Karpagam University

  • White Papers // Sep 2012

    An Enhanced Approach for Treating Missing Value Using Boosted K-NN

    Knowledge Discovery in Dataset (KDD) plays a vital role in information analysis and retrieval based applications. Quality of data is the most indispensable component of KDD. The factor which affects the quality of datasets is presence of missing values. The data collected from the real world often contains serious data...

    Provided By Karpagam University

  • White Papers // Sep 2012

    Load Shedding Using Window Aggregation Queries on Data Streams

    The processes of extracting knowledge structures for continuous, rapid records are known as the Data Stream Mining. The main issue in stream mining is handling streams of elements delivered rapidly which makes it infeasible to store everything in active storage. To overcome this problem of handling voluminous data the authors...

    Provided By Karpagam University

  • White Papers // Sep 2012

    An Enhanced Code Encryption Approach with HNT Transformations for Software Security

    Security threats such as viruses, worms, trojans and spyware affects the security and authentication of software codes, forcing software developers to build security schemes for better software protection. These software threats exploit the authenticated data of the software and confidentiality, integrity and accessibility is greatly affected by these software threats....

    Provided By Karpagam University

  • White Papers // Aug 2012

    Content Aware Retargeting of Stego Images

    Images play a vital role in steganography, as cover media to hide secret messages. Retargeting becomes mandatory while transmitting image in a heterogeneous network because sender and recipient may not have display devices of same resolution. Resizing images by scaling or cropping also lead to loss of visually important features....

    Provided By Karpagam University

  • White Papers // Nov 2012

    Mobility Scenario of Dissimilar Mobility Models using the DSR Protocol in Ad-hoc Sensor Network- A Survey

    The mobility model used emulates closely the real-life Scenarios. The mobility model dictates the movement of nodes and plays an important role in determining the protocol and connectivity of these nodes. The authors describe several mobility models that represent mobile nodes whose movements are independent of each other (i.e. Entity...

    Provided By Karpagam University

  • White Papers // Aug 2012

    Secured Power Aware Routing Protocol (SPARP) for Wireless Sensor Networks

    Several wireless sensor network applications ought to decide the intrinsic variance between energy efficient communication and the requirement to attain preferred Quality of Service (QoS) such as packet delivery ratio, delay and to reduce the power consumption of wireless sensor nodes. Also the intended protocols that are developed aims in...

    Provided By Karpagam University

  • White Papers // Aug 2012

    Estimation of Evolutionary Optimization Algorithm for Association Rule Using Spatial Data Mining

    The innovative process for spatial data is more risk when compared to relational data. This can be functional for the efficiency and effectiveness of algorithms as well as the difficulty of possible patterns that can be establish in a spatial database. To optimize the rules generated by Association Rule Mining...

    Provided By Karpagam University

  • White Papers // Jul 2012

    Anomaly Detection and Elimination Algorithm for RFID Data

    The RFID technology has penetrated into all the sectors like supply chain automation, asset tracking, medical/Health Care applications, people tracking, Manufacturing, Retail, Warehouses, Livestock Timing and the healthcare sector due to its increased functionality, low cost, high reliability and easy-to-use capabilities. RFID system produces data that are unreliable, low-level, and...

    Provided By Karpagam University

  • White Papers // Apr 2014

    Certain Investigation on Missing Value Imputation Techniques

    Missing values can cause incorrect conclusions about data. Correspondingly, substitution of the missing values may introduce inaccuracies and irregularity. In the final result, a data value missing is the main drawback. Due to this problem, the system performance has the highest error rate in other words it degrades the system...

    Provided By Karpagam University