Reed Elsevier

Displaying 1-40 of 909 results

  • White Papers // Nov 2013

    An Efficient Implementation of a Reversible Single Precision Floating Point Multiplier Using 4:3 Compressor

    In this paper, the authors propose an efficient design of a reversible single precision floating point multiplier based on compressor. The single precision floating point multiplier requires the design of an efficient 24x24 bit integer multiplier. In the proposed architecture, the 24x24 bit multiplication operation is fragmented to nine parallel...

    Provided By Reed Elsevier

  • White Papers // Aug 2013

    High-Level Power and Performance Estimation of FPGA-Based Soft Processors and Its Application to Design Space Exploration

    In this paper, the authors present a design space exploration framework for an FPGA-based soft processor that is built on the estimation of power and performance metrics using algorithm and architecture parameters. The proposed framework is based on regression trees, a popular machine learning technique that can capture the relationship...

    Provided By Reed Elsevier

  • White Papers // Jul 2012

    Failure and Reliability Analysis of STT-MRAM

    Spin Transfer Torque Magnetic RAM (STT-MRAM) promises low power, great miniaturization prospective (e.g. 22nm) and easy integration with CMOS process. It becomes actually a strong non-volatile memory candidate for both embedded and standalone applications. However STT-MRAM suffers from important failure and reliability issues compared with the conventional solutions based on...

    Provided By Reed Elsevier

  • White Papers // Sep 2014

    Using Quantum Key Distribution for Cryptographic Purposes: Asurvey

    "The appealing feature of Quantum Key Distribution (QKD), from a cryptographic viewpoint, is the ability to prove the Information-Theoretic Security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Evolvable Hardware: A Synthesis and Analysis Using Different Evolutionary Strategies

    In this paper, Cartesian genetic algorithm with evolutionary strategies are used to synthesize digital circuits like full adder and 2 bit multiplier, constructed with only universal gates. The fitness function and different crossover techniques are also such used that minimum gates are utilized. The Genetic Algorithms (GA) with evolutionary strategies...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Trust Evaluation for Detecting Black Hole Attack on AODV Routing Protocol by Using Back Propagation Algorithm of Neural Network

    "A MANET consists of autonomous mobile nodes that are free to roam arbitrarily with no centralized controller such as a router to determine the communication paths. Each node in the ad hoc network has to rely on each other in order to forward packets. This kind of nature of MANET...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    A Framework for Evaluating Web Service Based on Threat Patterns

    "The authors present a new methodology for web service to address the security issues and proposed a new computation technique which optimizes complex problem into smaller sub problems that can be solved more efficiently. In this paper, they present a study on vulnerability scanners to detect security vulnerabilities in publicly...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Mobile Embedded System for Advanced Weather Forecasting in Rural Area

    "City wise weather office is used for generating daily weather reports in present days. They study and report weather conditions from satellite images. But in reality, condition of weather keeps changing continuously, and, it takes time for these satellites to report the instant changes of weather. Thereby, most recent updates...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    An Efficient Hybrid Approach for Opportunistic Networks

    "Opportunistic network is next generation network of MANET. In opportunistic networks, route between mobile nodes never exits, mobile nodes communicate with each other once they notice chance to speak. Furthermore, nodes aren't alleged to possess or acquire any data regarding the constellation. Routes are engineered dynamically, whereas messages are route...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Rough Set Based Feature Selection Algorithm for Effective Intrusion Detection in Cloud Model

    "There exist many problems in intrusion detection systems such as large data volume, features and data redundancy which seriously affect the efficiency of the detection algorithm. Such problems need to be addressed in developing reliable intrusion detection systems. In this paper, the authors propose an intrusion detection model that combines...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    "Emotion Recognition Using DWT, KL Transform and Neural Network"

    "Human face communicates important information about a person's emotional condition. In this paper, an approach for facial expression recognition using wavelet transform for feature extraction and neural network classifier for five basic emotions is proposed. The strength of the algorithm is the reduction in feature size and use of less...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Artificial Neural Network Based Learning in Cognitive Radio

    "Over the last decade the world of wireless communications has been undergoing some crucial changes, which have brought it at the forefront of international research and development interest, eventually resulting in the advent of a multitude of innovative technologies and associated products such as Wi-Fi, WiMAX, 802.20, 802.22, wireless mesh...

    Provided By Reed Elsevier

  • White Papers // Jan 2014

    Video Surveillance System for Security Applications

    "Computer Vision (CV), or image understanding, seeks to replace human interpretation with computer-based interpretation. Computer Vision deals with the automatic analysis, reconstruction, and recognition of objects in a scene from one or more images. Basically a video surveillance system deals with detection of unusual motion. The efficiency of video surveillance...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Multilevel Cryptography Scheduler

    "Cryptographic transformations are a fundamental building block in many security applications and protocols. To improve performance, several vendors market hardware accelerator cards. However, until now no operating system provided a mechanism that allowed both uniform and efficient use of this new type of resource. The authors have implemented the operating...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Classification and Analysis on Routing Nodes in MANET Using Fuzzy Proximity Relation With Ordering and Formal Concept Analysis

    "Routing information plays a vital role in Mobile Ad-hoc NETwork (MANET). In MANET, each node maintains routing information that assists the routing process. Routing nodes and their routing attributes are essential in determining the performance of MANET. Thus, it is necessary to obtain knowledge on routing nodes and their attributes....

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Trust Assessment Policy Manager in Cloud Computing

    "Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Computing resources include networks, servers, storage, applications, and services. Cloud providers find adequate and accurate solutions to address the data privacy and security specifications of their business model. This paper proposes...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    An Application of Hybrid ACL Approach in Cloud Environment

    "Cloud computing is a revolutionary way of representation of services to its end users. Main characteristic of cloud environment is a separation between data owner and data user. Due to this separation, data owner is totally unaware about the status of its data plus total number of access performed on...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    "A New Approach of Intrusion Detection System Using Clustering, Classification and Decision Table"

    "Intrusion Detection System (IDS) plays an important role to achieve higher security in finding or detecting malicious activities over network based as well as host based system for a couple of years. There are different types of intrusion detection system and anomaly intrusion detection is one of them. Currently this...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Cryptanalysis of a Chaotic Neural Network Based Chaotic Cipher

    "The rapid development of multimedia and network technology has promoted the use of digital images and videos being transmitted over internet and wireless network more and more frequently. So the security of digital images and videos is needed in many applications. Recently a triple key encryption method based on logistic...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Security Solution to Protect SCADA Systems from Cyber Attacks

    "Supervisory Control And Data Acquisition (SCADA) systems, control and monitor utility infrastructure, such as electricity, gas, water etc, which happen to be part of critical infrastructure. Existing SCADA systems were originally designed for reliability. Initial SCADA systems used proprietary protocols like Modbus, DNP3 to access sensed data and initiate supervisory...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Stability History Based Route Selection Using K-Means Clustering in Mobile Adhoc Networks

    "In Mobile Ad-hoc NETworks (MANETs) there is no fixed communication infrastructure, so it allows more flexible model of communication than traditional networks. For any active connection in such a networks, the end hosts as well as the intermediate nodes, which relay the information, can be mobile. Because of this dynamic...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    End-to-End QoS Mapping Between UMTS and WiMAX in Loose Coupling Heterogeneous Wireless Network

    "One of the main objectives of Heterogeneous Wireless Access Networks (HWANs) is to integrate the different wireless access technologies, such as UMTS, WiMAX and WLAN, with a common IP-based network in order to offer mobile users continuous and unified service in a transparent way. However, one of the major issues...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Object Oriented Approach to Anatomy of Intrusion Detection System

    "Now-a-days intrusions become more increased in individual systems, so activities in a system must be observed by scanning and it must be saved for future use. If any discrepancy is found from observed behavior then a report must be generated to help red teams. The central idea of the authors'...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Congestion Control for Computer Networks Using Weighted Random Early Detection (WRED)

    "Computer network is a set of computers and hardware components linked together to communicate with each other. Congestion in networks occurs when at any node there is more data traffic than the outgoing link capacity. Effects of congestion are packet delay, packet drop, reduced system throughput and degraded quality of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Optimized

    "A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes in which different routing protocols are used to form the communication network. So, far there are numerous routing protocols are discovered in which AODV performs superior than all. Ad-hoc network suffer from the bunch of issues in which...

    Provided By Reed Elsevier

  • White Papers // Mar 2014

    Measuring the Impact of JellyFish Attack on the Performance of Mobile Ad Hoc Networks Using AODV Protocol

    "MANETs are susceptible to various attacks. Out of which Denial of Service (DoS) are most dangerous and very difficult to detect and defend. Jellyfish is a new DoS attack categorized as JF reorder attack, JF periodic dropping attack and JF Delay variance attack. In JF delay variance attack, a JF...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Augmenting Naïve Bayes Classifier With Domain Knowledge in Detecting Malware

    "Malicious software attacks on the Internet are on the rise in both frequency and sophistication. The use of Naïve Bayes technique has been shown to be capable to detect malware. This paper proposes the usage of domain knowledge in the algorithm to improve detection accuracy. The domain knowledge consists of...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Enhanced Security Framework for Cloud Computing

    "Cloud computing provides large scale pool of resources, wide access, dynamicity, cost effective solution for storage. Public, private and hybrid deployment models exist for cloud computing along with various service models like integration as service, database as service, and security as service. Though cloud computing is being adopted as the...

    Provided By Reed Elsevier

  • White Papers // Dec 2013

    Impact of MAC Protocol Over the Performance of Routing Protocol in MANET

    "MANET is an unstructured network formed dynamically between a set of mobile nodes. Routing is a challenge for this network due to its dynamic topology as well as resource constraints. Many routing and MAC layer protocols have been proposed in the network history and most of the researches are under...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Traffic Based QoS Specific Adaptive Buffer Allocation in WiMAX Networks

    "Buffer allocation in WiMAX maximizes the throughput by achieving high link utilization of system and minimizes the power consumption. In this paper, traffic based QoS specific adaptive buffer allocation in WiMAX networks is proposed to increase the system throughput by using an adaptive buffer allocation strategy. The buffer management block...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Efficient Approach of Multimedia Transcoding for Streaming Over Mobile Devices

    "The proposed system introduces a novel framework that can optimize the bandwidth and maintain better visual qualities by performing transcoding on the multimedia contents mainly targeted over the mobile devices. The system designed in Matlab considers both image and video as input file and performs multimedia transcoding considering BMP, GIFF,...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Comprehensive Security Scheme on MANETs

    "A Mobile Ad-hoc NETwork (MANET) is a self-organizing, infrastructure-less, multi-hop network. Security is a major issue in such networks. In this paper, a simple encryption scheme that uses masking has been proposed to secure these types of network. Message is encrypted with the key, which is generated using the contents...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Design of Advanced Intrusion Detection System

    "Advancements in network and communication technology are rapidly growing the data on internet. Even it brings today everyone on internet for individual's task. To do so, all businesses, government agencies, educational organizations, industries have setup their own networks and have connection with this rapid growing world. But in the sense...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    A Block Cipher for Multimedia Encryption Using Chaotic Maps for Key Generation

    "In the digital world today, the multimedia security becomes more important. Digital services such as Pay-TV, video conferencing, medical imaging systems, have need of consistent security in storage and communication of multimedia data. It is difficult to use the conventional algorithms such as DES and AES, directly in multimedia data,...

    Provided By Reed Elsevier

  • White Papers // Nov 2013

    Geo-Gossip: A Gossip Based Geographical Routing Protocol for Mobile Ad Hoc Networks

    "Existing ad hoc routing protocols induce large number of control packets while trying to discover the present location of a destination node in the network. Geographical ad hoc routing protocols reduce control packet overhead using past information about the destination node such as location, velocity and direction of motion during...

    Provided By Reed Elsevier

  • White Papers // Jul 2013

    Incorporating Template Security of Face Biometrics using Different Edge Detection Methods

    "In this paper, the authors address the issues of using edge detection techniques on facial images and to produce cancellable biometric templates. With increasing use of biometrics, there is a real threat for the conventional systems using face databases, which store images of users in raw and unaltered form. If...

    Provided By Reed Elsevier

  • White Papers // Jul 2013

    An Improved Trusted Full Disk Encryption Model

    "In this paper, the authors present a complete analysis of current storage protection models like Encrypting File System (EFS), traditional Full Disk Encryption (FDE), FDE with Trusted Platform Module (TPM) chip and Trusted Full Disk Encryption (TFDE) model, and points out the security loop-holes an attacker can exploit in them....

    Provided By Reed Elsevier

  • White Papers // Aug 2013

    Location Based Detection Algorithm for Clone Attack in Wireless Sensor Network

    "Wireless sensor nodes are composed of sensor nodes deployed in sensor fields. In this case Clone attacks happen easily in network. So many techniques are there to provide security for clone attack. The attackers can capture some of the node, take the information from them and replicate the nodes in...

    Provided By Reed Elsevier

  • White Papers // Aug 2013

    "Protecting Cloud Data With Encryption, Access Controls and Auditing"

    "Data security threats and related incidents, such as breaches, can be harmful to any organization. Data breaches can negatively impact organizations in a variety of ways including increased costs, loss of brand reputation and revenue, inability to conduct business, and/or loss of secrets. In order to protect private and confidential...

    Provided By Reed Elsevier

  • White Papers // Aug 2013

    Mitigating the Attacks on Recommendation Trust Model for Mobile Ad Hoc Networks

    "Trusts based models, are solution to overcome the passive insider attacks and are used to enhance the cooperative routing in MANET. Trust based models calculate the trust value of neighbor nodes in two ways, viz., direct trust and indirect trust (recommendation trust). Direct trust value is calculated by observing the...

    Provided By Reed Elsevier