Research In Motion

Displaying 1-40 of 134 results

  • White Papers // Mar 2014

    Information Technology & Business Management

    Business management is often about information management more than any other skill, as today's manager has quick access to every type of report about the operation of the business. An effective manager must be able to analyze all of the available information and sort out what is pertinent to the...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud SQL Security

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability. But there are some drawbacks such as privacy, security is very important aspects. In...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Overview - Snort Intrusion Detection System in Cloud Environment

    Now-a-days cloud computing has become very popular since it reduces infrastructure cost. Hence, the level of security measures also has to be increased. Intrusions Detection Systems (IDSs) are designed to handle attacks but many Intrusion Detection System (IDS) are designed for specific attack/attacks. It is evident that no single technique...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CAGDI: A New Conceptual Model of Early and Late Requirement Engineering for Non Fading Dataware House

    Building a data warehouse is a very challenging task. Most of the data ware house project fails to meet the business requirements and business goals because of the improper requirement engineering phase. The chaos all through the development of requirements evolves due to disparity between users and developers resulting in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Java Based Distributed File System

    There are distributed file systems that are being used in businesses and individuals but still users face various challenges and problems in using those systems. The distributed file system based on Java resolve the difficulties that were occurring in the past systems and provides various functionalities to users such as...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Clustering - A New Perspective

    Although there has been a demarcation between development and evolution (maintenance) of software, this is increasingly irrelevant as fewer and very fewer systems are completely new. Additionally, after the system had gone through many changes during the maintenance, remembering the system's structure is less possible one. Software architecture is a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Survey on Association Rule Mining in Market Basket Analysis

    Data mining refers to extracting knowledge from large amount of data. Market basket analysis is a data mining technique to discover associations between datasets. Association rule mining identifies relationship between a large set of data items. When large quantity of data is constantly obtained and stored in databases, several industries...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Finding Execution Faults in Dynamic Web Application

    Pin down is a framework for root cause analysis on dynamic web application. Fault localization in dynamic web application is the problem of decisive where in the source code modifies has to be completed in order to fix the perceived failures. The cause of the failure is called as execution...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Efficient Data Mining Algorithm for Reducing High Toll Transactions

    Mining cost efficient item-sets from a transactional database refers to the discovery of transaction sets with cost efficient characteristics improving overall profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate item-sets for cost efficient item-sets....

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Comparative Approach to Reduce the Waiting Time Using Queuing Theory in Cloud Computing Environment

    Cloud computing is a model to provide different type of services like SaaS, PaaS and IaaS over the internet. Cloud is a collection of virtualized and interconnected computers dynamically presented as one or more unified computing resources based on service level agreement. Job scheduling is the very important issue in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Selection of n in K-Means Algorithm

    One of the most popular and widely used algorithms in data clustering is K-means algorithm. However, one of its main downsides is that user has to specify number of clusters that is n, before the algorithm is to be implemented anywhere. This paper reviews existing methods for choosing the available...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Security and Privacy issues in Cloud Computing and Providing Platform for E-learning

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of the cloud computing is to apply traditional supercomputing or high performance computing power. To do this cloud computing uses network of large group...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Data Encryption by Image Steganography

    In modern era data is heavily gaining importance as information is dependent on the raw facts i.e. data. The exchange of information is required to share resources among the distributed users which may be separated by locations. While transferring the data among the users the confidentiality and privacy should be...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Study on Cost Estimation of Service Delivery in Cloud Computing Environment

    The term cloud computing is sometimes used to refer to a new paradigm; some authors even cited a new technology that offers IT resources and services over the Internet. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. The economic crisis can bring with enterprise...

    Provided By Research In Motion

  • White Papers // Feb 2014

    IDS in Cloud Environment as Service Based Manner

    Every service of security provided by IDS will work as a subscription based service, so that the host can deploy some part of IDS facilities, as part of their own LAN. Intrusion detection as a part of cloud infrastructure will fulfill the need of proposed work IaaS (Infrastructure as a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Novel Approach for Query Expansion Using Genetic Algorithm

    In this paper the authors focused towards query expansion, which is an important technique for improving retrieval efficiency of an information retrieval system. Specifically the paper proposes a novel evolutionary approach for improving efficiency of Pseudo Relevance Feedback (PRF) based query expansion. In this method the candidate terms for query...

    Provided By Research In Motion

  • White Papers // Feb 2014

    An Overview of Distributed Databases

    A database is a collection of data describing the activities of one or more related organizations with a specific well defined structure and purpose. A database is controlled by DataBase Management System (DBMS) by maintaining and utilizing large collections of data. A distributed system is the one in which hardware...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Accessible Cloud Computing Based E-learning Environment for Disabled People

    Cloud computing is multiple set of services which provide infrastructural resources using internet as network as interconnecting media, applications and data storage on a service provider's server (third party). The basic principle of e-learning is to achieve personal learning goals by acquiring skills and knowledge through computers or other network-enabled...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Printer: A Survey

    Cloud printing services enable any application on any device to print to any cloud connected printer. The file is securely sent to the printer over the web .it does not matter printer is in the same room or on another continent. Today, people shift towards cloud based application of web...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Analysis of Palmprint Authentication System Using Wavelet Based Multi-Resolution Analysis

    A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric has gained much attention in the security world recently. Many types of personal identification systems have been developed and palmprint...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

    In this paper, the authors discuss about the improvement of security and privacy issues in wireless ad-hoc network, wireless mesh network and wireless sensor network with the help of routing protocols, authentication and cryptographic tools. Ad hoc network is a collection of nodes that is connected through a wireless medium...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Well-Known Gartner's Seven Security Issues Which Cloud Clients Should Advert

    In this paper, the authors present an applied research study on cloud computing process based on Gartner's security issues. The main objective of this research study is to get knowledge about cloud computing security and the important role which will they pay for the selection of resources. Cloud computing is...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Cloud Computing Services and its Application

    Cloud computing is a web-based, distributed computing using which information, resources and software's are distributed among different types of users. This computing approach allows much easier, flexible and high availability of resources at a very lower cost. The distribution of resources and services are on web, so this has opened...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Authentication & Verification of Secure Parking Using OCR Technique

    Intelligent Transportation System (ITS) has become an integral part of the Transportation Industry these days and it consists of License Plate Recognition (LPR) System. License Plate Recognition is also called Car Plate Recognition (CPR) or Automatic Number Plate Recognition (ANPR) System. In this paper an attempt has been made to...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Public Key Cryptanalysis Scheme Using Hierarchical Structure in Wireless Sensor Networks

    The growth of wireless sensor networks is widely spread over different applications, need of security mechanism is been the main issue nowadays. Therefore it is necessary to communicate between the sensor node protectively .The key management mechanism plays a major role in providing security in wireless sensor network. The authors...

    Provided By Research In Motion

  • White Papers // Nov 2013

    Increased MSME and Global Entrepreneurship Due to Cloud Computing

    There has been a significant increase in the number of Medium, Small and Micro scale Enterprises (MSME) around the world which has helped young Entrepreneurs to build small scale businesses. Cloud computing has been one of the primary enabler of the same because of the multi-tenant, ubiquitous, on demand computing...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Knowledge Management in Libraries

    The library will play a very crucial role in the extension and modification of knowledge. The development of knowledge management in recent years has become the key concern for librarian and libraries. Knowledge management requires more effective methods of information handling, speedy transfer of information. This paper is intended to...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Network Security-The Biggest Challenge in Communication

    Today one of the biggest challenges is to secure the internal network in communication. Understanding the fundamentals of any technology is vital if ever going to fully understand that technology. Without putting in ample time learning and practicing the fundamentals of security, it won't be able to learn the more...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Communication through Mobile Agent with Pre- Processing Techniques in Electronic Environment

    Mobile agents are emerging as a major trend of distributed systems. Different mobile agent frameworks are being actively developed in the research community. Electronic commerce and information retrieval are two prospective directions for application of mobile agents. Nevertheless, security and reliability are two crucial concerns for such systems, especially when...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Warehousing

    Data warehouse and On-Line Analytical Processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Data warehouse provides an effective way for the analysis and statistic to the mass data and helps to do the decision making. In recent years, data warehousing...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Automobile Security System Based on Face Recognition Structure Using GSM Network

    In this paper, the authors proposed embedded automobile security system Face Detection System (FDS) is used to detect the face of the driver and compare it with the predefined face. In the night when the vehicle owner is sleeping and someone has theft the vehicle, then FDS obtains the images...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Study of Hierarchical Clustering Algorithm

    Clustering is the process of grouping the data into classes or clusters, so that objects within a cluster have high similarity in comparison to one another but these objects are very dissimilar to the objects that are in other clusters. Clustering methods are mainly divided into two groups: hierarchical and...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Combating Packet Sniffing

    For years, computer-network administrators have used packet sniffers to monitor their networks to diagnose and solve problems. However, sniffers today have the potential to cause personal harm because they allow a hacker to confiscate confidential information. Organizations cannot afford inside agents to sniff out important data which could harm their...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Ensuring Cloud Security Using Cloud Control Matrix

    Cloud computing is the most evolutionary technology prevalent today, which is widely accepted by organizations due to cost-affordability, efficiency and flexibility. It enables the virtual organization to share geographically distributed resources as they pursue common goals, assuming the absence of central location, omniscience and an existing trust relationship. It shifts...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Novel Technique of Securing Mobile Adhoc Networks using Shared Trust Model

    Mobile Ad-hoc NETworks (MANETs) are mostly used in the conditions where any fixed backbone infrastructure is not available. They are easy to implement but they are more prone to attacks and threats. Being mobile and using distributed services are few of the weak points of security in MANETs. As the...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // Dec 2008

    Enforcing Encryption of Internal and External File Systems on BlackBerry Devices

    The BlackBerry Enterprise Solution encrypts data traffic in transit between the BlackBerry Enterprise Server and the BlackBerry devices automatically. By default, the BlackBerry Enterprise Solution generates the master encryption key and message key that the BlackBerry Enterprise Server and BlackBerry devices use to encrypt and decrypt all data traffic between...

    Provided By Research In Motion

  • White Papers // Aug 2008

    The Promise of Mobile Unified Communications

    Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand. An exclusive Computerworld online survey offers insight into how companies can develop cost-effective strategies for implementing or improving mobile applications and foster an efficient workplace. Much of the...

    Provided By Research In Motion

  • White Papers // May 2009

    Pushing It to the Streets: (or to the Device)

    Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and...

    Provided By Research In Motion

  • Case Studies // Mar 2009

    Boosts Productivity and Time Capture With BlackBerry Solution

    UK law firm Addleshaw Goddard, with three offices in London, Leeds and Manchester, has about 1,500 staff members, including 182 partners and over 500 other fee earners. The law firm is ranked 15th in the country according to fee income and sixth by the number of FTSE 100 Clients. Half...

    Provided By Research In Motion

  • Case Studies // Jun 2009

    Leather Goods Manufacturer Improves Customer Service and Productivity With BlackBerry Solution and Newmann

    Valigeria Roncato is a provider of leather suitcases in Italy, Germany, Austria, Belgium and Holland. The company sees annual sales of more than ? 40 million and produces around 1,500 suitcases per day. Commercial managers of the company work in a field to communicate with local stores, manufacturing plants and...

    Provided By Research In Motion

  • Case Studies // Jun 2009

    IT Firm Improves Customer Communication by 20% and Boosts Productivity With BlackBerry Solution and Maximizer Mobile CRM

    Netherlands-based IT company Systony specializes in Customer Relationship Management (CRM) deployment and customized software development for small and medium-sized enterprises (SMEs). Over the past five years, Systony has been using the Maximizer CRM, which is a proven and affordable CRM solution. The solution was able to meet requirements of the...

    Provided By Research In Motion

  • Case Studies // Jun 2009

    Digicore Improves Response Times and Communication With BlackBerry Solution

    South African company Digicore is a provider of asset tracking and management solutions with its C-track system for vehicle owners. Digicore operates in 36 countries and clients of the company include multinational companies such as mining giant BHP Billiton and the energy company Chevron. Digicore employs over 660 people in...

    Provided By Research In Motion

  • White Papers // Mar 2014

    Information Technology & Business Management

    Business management is often about information management more than any other skill, as today's manager has quick access to every type of report about the operation of the business. An effective manager must be able to analyze all of the available information and sort out what is pertinent to the...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Knowledge Management in Libraries

    The library will play a very crucial role in the extension and modification of knowledge. The development of knowledge management in recent years has become the key concern for librarian and libraries. Knowledge management requires more effective methods of information handling, speedy transfer of information. This paper is intended to...

    Provided By Research In Motion

  • Downloads // Mar 2010

    Introducing BlackBerry® Enterprise Server Express

    Get BlackBerry Enterprise Server Express for Free Connect two people via BlackBerry? smartphones and ideas get bigger. Progress happens faster. Answers get smarter. So imagine what happens when you give a business the freedom to connect all its employees. BlackBerry? Enterprise Server Express enables businesses of any size...

    Provided By Research In Motion

  • White Papers // May 2009

    Prorecting the BlackBerry Device Platform Against Malware

    This document describes the third-party Java application control features of the BlackBerry? Enterprise Solution and provides an overview of how you might use those features and place the BlackBerry Enterprise Solution within your corporate network architecture to contain the threat of malware on your BlackBerry? devices and your corporate network.

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Devices with Bluetooth - Security Overview

    This whitepaper from looks at how the BlackBerry? Enterprise Solution is designed to encrypt data in transit at all points between the BlackBerry device and the BlackBerry? Enterprise Server to protect your organization from data loss or alteration.

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Server IT Policy

    "This free whitepaper from Research in Motion outlines how IT Managers can assign IT policies to BlackBerry? devices to satisfy organization's security policy requirements and to reflect the needs of users who use the BlackBerry devices"

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution - Security Technical Overview

    This free to access whitepaper describes the security features of the BlackBerry? Enterprise Solution and provides an overview of the BlackBerry security architecture

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution and RSA SecurID

    BlackBerry? devices are becoming ubiquitous throughout the enterprise, as organizations improve employee connectivity and communications. The BlackBerry? Enterprise Solution?designed and manufactured by Research In Motion (RIM)?is a flexible, Information Technology (IT)-friendly solution that provides mobile users with secure wireless access to their enterprise email and critical business applications

    Provided By Research In Motion

  • White Papers // May 2009

    Placing the BlackBerry Enterprise Solution in a Segmented Network

    A segmented network is designed to isolate potential attacks within the organization's LAN and contain them on one computer. The BlackBerry? Enterprise Server supports installation in a segmented network, and permits you to run BlackBerry Enterprise Server components in different network segments.

    Provided By Research In Motion

  • White Papers // Apr 2012

    CIO survey: The effect of consumer-led IT

    With the arrival of the smartphone and tablet, the IT industry has seen one of the most profound revolutions since the invention of the silicon chip and the launch of the web. As a Fortune 1000 CIO says, "IT consumerisation is having a dramatic effect on everything we do". From...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Three keys to combining BYOD and security

    Employee devices, from smartphones to tablets, are ubiquitous in the workplace now. They help workers to be more mobile and empower them to make decisions away from their desks. But mobility can be risky if not handled properly, and it's no longer a simple answer of cracking down on bring-your-own-device...

    Provided By Research In Motion

  • White Papers // Apr 2012

    BYOD costs: Balancing savings and risk

    Smartphones and tablets have changed the face of corporate IT. With bring-your-own-device (BYOD), users demand access to the same technologies they have at home. Having to certify, provide and manage consumer-grade devices can add complexity and costs, as well as increasing the risk of data loss and leakage. That's on...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Adapting BYOD security strategies to protect data

    The consumerisation of IT in the workplace goes way beyond bring-your-own-device usage: there is also the issue of social networking sites and services to address. IT security managers face a major headache in engineering a protective security umbrella to keep sensitive data safe. This Research In Motion (RIM) white paper...

    Provided By Research In Motion

  • White Papers // Apr 2012

    How to benefit from mixing business and personal devices

    Working from home used to mean you had to lug home a briefcase full of paper or the heavy company laptop. Now, chances are employees have a laptop or desktop computer of their own at home that is at least as powerful as the one on their desk at work,...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Choosing a consumer-friendly IT strategy

    There are two trends causing IT managers to rethink their strategies: the growing popularity of consumer technology among business users, and the shift of business applications and data to the cloud. These technologies give IT departments both real and perceived difficulties when it comes to integrating them into the business....

    Provided By Research In Motion

  • Webcasts // Jan 2009

    Dealing With Intellectual Property and How to Use This to Enhance the Value of Your Business

    The presenter of this webcast shows how to deal with intellectual property and how to use this to enhance the value of your business.

    Provided By Research In Motion

  • White Papers // Oct 2008

    BlackBerry Push APIs: Accessing the Power of BlackBerry Push Technology

    One of the cornerstones of the BlackBerry solution has been the ability to proactively deliver, or "Push", data to BlackBerry devices. BlackBerry Push Technology has been used to push emails to users and to synchronize calendar information. However, although BlackBerry Push Technology has been available to developers creating enterprise-based solutions...

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Mar 2009

    BlackBerry Enterprise Solution

    This paper describes the security features that the BlackBerry Enterprise Server version 5.0, BlackBerry Desktop Software version 5.0, and BlackBerry Device Software version 5.0 support, unless otherwise stated. To determine if an earlier software version supports a security feature, see the documentation for earlier versions of the BlackBerry Enterprise Server,...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // Dec 2011

    Queuing Algorithms Performance Against Buffer Size and Attack Intensities

    Distributed Denial of Service (DDoS) attack is one of the biggest threats now days. This paper aims at providing the simulation results of buffer size and attack intensities effect on various queuing algorithms such as DropTail (DT), Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), Deficit Round Robin (DRR) and Random...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Anti-Trust Rank for Detection of Web Spam and Seed Set Expansion

    In the recent times, the web has been the most popular and perhaps the most efficient platform for sharing, storing as well as retrieving information. Finding the required information from the web is facilitated by search engines. Search engines form the interface between the web and the users. Given the...

    Provided By Research In Motion

  • White Papers // Oct 2010

    Feature Ranking Algorithm for Classification of Spam E-mail Data

    The feature ranking algorithm RELIEF-d is investigated for feature selection from spam E-mail Database. Spam is a unsolicited, unwanted email that was sent indiscriminately, directly or indirectly, by a sender having no current relationship with the recipient. In most classification models, identifying the more relevant features is as important as...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Securing PHP Based Web Application Using Vulnerability Injection

    In the past few years, vulnerability injection technique has been given relatively lesser attention by the research community. The probable reason might be positioned in its objective which is apparently contrary to the purpose of making applications more secure. However, the same technique can be used in various research applications...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

    In this paper, the authors discuss about the improvement of security and privacy issues in wireless ad-hoc network, wireless mesh network and wireless sensor network with the help of routing protocols, authentication and cryptographic tools. Ad hoc network is a collection of nodes that is connected through a wireless medium...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Well-Known Gartner's Seven Security Issues Which Cloud Clients Should Advert

    In this paper, the authors present an applied research study on cloud computing process based on Gartner's security issues. The main objective of this research study is to get knowledge about cloud computing security and the important role which will they pay for the selection of resources. Cloud computing is...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Public Key Cryptanalysis Scheme Using Hierarchical Structure in Wireless Sensor Networks

    The growth of wireless sensor networks is widely spread over different applications, need of security mechanism is been the main issue nowadays. Therefore it is necessary to communicate between the sensor node protectively .The key management mechanism plays a major role in providing security in wireless sensor network. The authors...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Cloud Computing Services and its Application

    Cloud computing is a web-based, distributed computing using which information, resources and software's are distributed among different types of users. This computing approach allows much easier, flexible and high availability of resources at a very lower cost. The distribution of resources and services are on web, so this has opened...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Analysis of Palmprint Authentication System Using Wavelet Based Multi-Resolution Analysis

    A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric has gained much attention in the security world recently. Many types of personal identification systems have been developed and palmprint...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Authentication & Verification of Secure Parking Using OCR Technique

    Intelligent Transportation System (ITS) has become an integral part of the Transportation Industry these days and it consists of License Plate Recognition (LPR) System. License Plate Recognition is also called Car Plate Recognition (CPR) or Automatic Number Plate Recognition (ANPR) System. In this paper an attempt has been made to...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud SQL Security

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability. But there are some drawbacks such as privacy, security is very important aspects. In...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Built-In Self-Repair Mechanism for Embedded Memories Using Totally Self-Checking Logic

    Today's deep submicron technologies allow the integration of multiple memories on a single chip. Embedded memories are one of the most universal cores, which occupy around 90% area in System-on-Chip (SoC) architecture due to the demand for high data storage. So, the embedded memory test process has become an essential...

    Provided By Research In Motion