Samrat Amin

Displaying 1-4 of 4 results

  • White Papers // Dec 2012

    A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function

    The security issues are always raised for remote authentication service. Smart card based authentication protocol is best suited for authenticate legitimate user. Developing secure authentication protocol is a strong challenge. There are many potential attacks that are targeted at authentication such as insider attack, offline password guessing attack, masquerade attack,...

    Provided By Samrat Amin

  • White Papers // Aug 2012

    Survey of Recent Clustering Techniques in Data Mining

    Cluster analysis or clustering is the task of assigning a set of objects into groups called clusters. Main task of clustering are explorative data mining, and a common technique for statistical data analysis used in many fields, including machine learning, pattern recognition, image analysis, information retrieval, and bioinformatics. Cluster analysis...

    Provided By Samrat Amin

  • White Papers // Aug 2012

    Traffic Control Scheme Using Mobile Data Collectors for Wireless Sensor Network

    A major challenge affecting the performance of Wireless Sensor Networks (WSNs) comes from the unbalanced traffic over different parts of networks. High delay in transmitting information from one node to another is the prime reason behind unbalanced energy consumption .delay has continuous nature; even if two nodes are placed in...

    Provided By Samrat Amin

  • White Papers // Nov 2009

    A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains

    This has much in common with traditional work in statistics and machine learning. However, there are important new issues which arise because of the sheer size of the data. One of the important problem in data mining is the Classification rule learning which involves finding rules that partition given data...

    Provided By Samrat Amin

  • White Papers // Dec 2012

    A Noble Remote User Authentication Protocol Based on Smart Card Using Hash Function

    The security issues are always raised for remote authentication service. Smart card based authentication protocol is best suited for authenticate legitimate user. Developing secure authentication protocol is a strong challenge. There are many potential attacks that are targeted at authentication such as insider attack, offline password guessing attack, masquerade attack,...

    Provided By Samrat Amin

  • White Papers // Aug 2012

    Survey of Recent Clustering Techniques in Data Mining

    Cluster analysis or clustering is the task of assigning a set of objects into groups called clusters. Main task of clustering are explorative data mining, and a common technique for statistical data analysis used in many fields, including machine learning, pattern recognition, image analysis, information retrieval, and bioinformatics. Cluster analysis...

    Provided By Samrat Amin

  • White Papers // Aug 2012

    Traffic Control Scheme Using Mobile Data Collectors for Wireless Sensor Network

    A major challenge affecting the performance of Wireless Sensor Networks (WSNs) comes from the unbalanced traffic over different parts of networks. High delay in transmitting information from one node to another is the prime reason behind unbalanced energy consumption .delay has continuous nature; even if two nodes are placed in...

    Provided By Samrat Amin

  • White Papers // Nov 2009

    A Way to Understand Various Patterns of Data Mining Techniques for Selected Domains

    This has much in common with traditional work in statistics and machine learning. However, there are important new issues which arise because of the sheer size of the data. One of the important problem in data mining is the Classification rule learning which involves finding rules that partition given data...

    Provided By Samrat Amin