Science Productions

Displaying 1-40 of 266 results

  • White Papers // Nov 2011

    Impact of Malicious Nodes Under Different Route Refresh Intervals in Ad Hoc Network

    Ad hoc networks are formed dynamically by group of mobile devices co operating with each other. Intermediate nodes between source and destination act as routers so that source node can communicate with the destination node even if it is out radio range and thus eliminating the necessity of infrastructure. Co...

    Provided By Science Productions

  • White Papers // Aug 2012

    Optimization Techniques to Record Deduplication

    Duplicate record detection is important for data preprocessing and cleaning. Artificial Bee Colony (ABC) is one of the most recently introduced algorithms based on the intelligent foraging behavior of a honey bee swarm. The authors' approach to duplicate detection is the use of ABC algorithm for generating the optimal similarity...

    Provided By Science Productions

  • White Papers // Aug 2012

    Fuzzy Cost Enabled Cluster Based Multipath Routing Algorithm for Mobile Ad-Hoc Networks

    This paper proposes the selection of best paths in Mobile Ad Hoc NETwork (MANET) based on multipath routing with fuzzy cost in respect of the Fuzzy Cost Enabled Cluster based Routing (FCECR). By implementing FCECR, they have made changes to reduce the cost and route discovery overhead for the selection...

    Provided By Science Productions

  • White Papers // Sep 2012

    Principal Component Analysis Based Feature Extraction, Morphological Edge Detection and Localization for Fast Iris Recognition

    This paper involves the Iris Localization based on morphological or set theory which is well in shape detection. Principal Component Analysis (PCA) is used for preprocessing, in which the removal of redundant and unwanted data is done. Applications such as Median Filtering and Adaptive thresholding are used for handling the...

    Provided By Science Productions

  • White Papers // Aug 2012

    Network Planning and Optimization for Multi-Hop Relay Placement in WiMAX Networks

    Wireless access networks can provide high level of quality of services at low network installation budget if the networks are planned by using proper methods. In this paper, the authors developed efficient network planning methods for Wireless Interoperability for Microwave Access (WiMAX) networks in which the multiple hops of relay...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Generic Charging Policy Based Accounting for Web Services

    Metering and charging are basic accounting functions that are essential for commercial usage of web services. Current charging and accounting schemes primarily involve users being charged flat or based on the connection/session time. Accounting management of web services should provide for metering, charging, accounting, billing, payment and auditing. The authors...

    Provided By Science Productions

  • White Papers // Sep 2012

    Impact of Algorithms for the Extraction of Minutiae Points in Fingerprint Biometrics

    As the importance of automatic personal identification applications increases, biometrics particularly fingerprint identification is the most consistent and greatly acknowledged technique. A very important step in automatic fingerprint recognition system is to extract the minutiae points from the input fingerprint images automatically and quickly. Fingerprints from the database FVC2002 (DB1-a)...

    Provided By Science Productions

  • White Papers // Aug 2012

    Wireless Sensor Networks Fault Identification Using Data Association

    Wireless Sensor Networks (WSN) are formed by thousands of lightweight nodes equipped with transducers for capturing information. The captured data are transmitted using multi hop routes to a base station, also called a sink. They can be extensively deployed during emergency response, medical monitoring and mission critical applications requiring extensive...

    Provided By Science Productions

  • White Papers // Oct 2012

    End to End Delay Improvement in Heterogeneous Multicast Network Using Genetic Optimization

    Multicast is a concept of group communication which refers to transmitting the same data or messages from a source to multiple destinations in the network. This one-to-many group communication is a generalization of the concepts of one-to-one unicast and one-to-all broadcast. To deliver data from the sender to all receivers...

    Provided By Science Productions

  • White Papers // Oct 2012

    A Block Cipher Algorithm for Multimedia Content Protection With Random Substitution Using Binary Tree Traversal

    Many people consume multimedia content (images, music, movie) on portable devices like DVD player, MP3 player, Portable Multimedia Player and also through Internet. The conventional algorithms such as DES and AES cannot be used directly in multimedia data, since multimedia data are repeatedly have high redundancy, large-volumes and require real-time...

    Provided By Science Productions

  • White Papers // Aug 2012

    Evaluation on Score Reliability for Biometric Speaker Authentication Systems

    Fusion weight tuning based on score reliability is imperative in order to ensure the performances of multibiometric systems are sustained. In this paper, two variant of conditions i.e., different performances of individual subsystems and inconsistent quality of test samples are experimented to multibiometric systems. By applying multialgorithm scheme, two types...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Methodological Framework for Software Safety in Safety Critical Computer Systems

    Software safety must deal with the principles of safety management, safety engineering and software engineering for developing safety-critical computer systems, with the target of making the system safe, risk-free and fail-safe in addition to provide a clarified differentiation for assessing and evaluating the risk, with the principles of software risk...

    Provided By Science Productions

  • White Papers // Aug 2012

    Dynamic Scheduling for Cloud Reliability Using Transportation Problem

    Cloud is purely a dynamic environment and the existing task scheduling algorithms are mostly static and considered various parameters like time, cost, make span, speed, scalability, throughput, resource utilization, scheduling success rate and so on. Available scheduling algorithms are mostly heuristic in nature and more complex, time consuming and does...

    Provided By Science Productions

  • White Papers // Aug 2012

    Reconfigurable Hardware Architecture for Network Intrusion Detection System

    Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention. The use of reconfigurable hardware for network security applications has great strides as Field Programmable Gate Array (FPGA) devices have provided larger and faster resources. This proposes architecture called "BV-TCAM" is presented, which is implemented for an FPGA-based Network...

    Provided By Science Productions

  • White Papers // Jul 2012

    A Metadata Based Storage Model for Securing Data in Cloud Environment

    Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring...

    Provided By Science Productions

  • White Papers // Jun 2009

    Multi Microkernel Operating Systems for Multi-Core Processors

    In the midst of the huge development in processors industry as a response to the increasing demand for high-speed processors manufacturers were able to achieve the goal of producing the required processors, but this industry disappointed hopes, because it faced problems not amenable to solution, such as complexity, hard management...

    Provided By Science Productions

  • White Papers // Dec 2013

    Server Failures Enabled Javaspaces Service

    Machine crashes and network partintions are major problems while running a distributed application. It is important to deal with failures that are caused by such events within runtime. Otherwise, it will be a must to restart the application from the beginning. A possible solution to this problem is to introduce...

    Provided By Science Productions

  • White Papers // Dec 2013

    Cluster Based Cache Consistency Using Agent Technique in Mobile Environment

    Caching is an essential mechanism in mobile environment. Mobile node makes access dynamic changing data object to their server and to get the interested data to keep their own as local copies in the cache. If the server database is updated, the data cached in mobile client is invalidated and...

    Provided By Science Productions

  • White Papers // Dec 2013

    Partial Rule Match for Filtering Rules in Associative Classification

    In this paper, the authors propose a new method to enhance the accuracy of Modified Multi-class Classification based on Association Rule (MMCAR) classifier. They introduce a Partial Rule Match Filtering (PRMF) method that allows a minimal match of the items in the rule's body in order for the rule to...

    Provided By Science Productions

  • White Papers // Dec 2013

    An Algorithm for Mining Usable Rules Using a Holistic Swarm Based Approach

    Evolutionary algorithms are capable of finding near optimal solutions to problems which are intractable to solve using conventional methods. One such problem is to accurately classify patients using rule mining methodology while controlling the size of output rules. A massive amount of data pertaining to medicine is generated and recorded...

    Provided By Science Productions

  • White Papers // Nov 2010

    Integrated Quantum and Classical Key Scheme for Two Servers Password Authentication

    The two-server password authentication architecture presented has control server and service server. The control server is controlled by a passive adversary while the service server is controlled by an active adversary. A single point of vulnerability, as in the existing password systems, is totally eliminated. Work with today's peer to...

    Provided By Science Productions

  • White Papers // Nov 2013

    Design and Implementation of Global Positioning System Receiver in Field Programmable Gate Array with Short Message Service

    In recent years, survival rate from myocardial infarction and bundle branch block has been increased due to the advancements in medical field. Continuous monitoring and location management of these patients becomes an essential task. Hence this paper aims in design and development of GPS in a Field Programmable Gate Array...

    Provided By Science Productions

  • White Papers // Nov 2013

    A Preemptive Link State Spanning Tree Source Routing Protocol for Mobile Adhoc Networks

    Routing protocol is a central issue in Mobile Ad-hoc NETworks (MANET). Several routing protocols have been proposed to deal with the routing issue in MANETs. Routing is a complex task in MANET, if the network is heavily loaded. In this paper a new QoS routing protocol is proposed which provides...

    Provided By Science Productions

  • White Papers // Nov 2013

    A Novel Prioritization Algorithm Model Based Test-Suite Generation Using Regression Testing

    The fully automatic Graphical User Interface (GUI) tool for any application using novel model based test suite generation techniques for a GUI. They are unable to control response time and time intervals are based on relationship between GUI events handlers and test cases with their responsibilities. The authors present a...

    Provided By Science Productions

  • White Papers // Nov 2013

    A Framework for Multilingual Text-Independent Speaker Identification System

    In this paper, the authors evaluate the performance of Extreme Learning Machine (ELM) and Gaussian Mixture Model (GMM) in the context of text independent multi lingual speaker identification for recorded and synthesized speeches. The type and number of filters in the filter bank, number of samples in each frame of...

    Provided By Science Productions

  • White Papers // Nov 2013

    A Review of Peer-to-Peer Botnet Detection Techniques

    In recent years, Peer-To-Peer (P2P) technology has an extensive use. Botnets have exploited this technology efficiently and introduced the P2P botnet, which uses P2P network for remote control of its bots and become one of the most significant threats to computer networks. They are used to make DDOS attacks, generate...

    Provided By Science Productions

  • White Papers // Nov 2013

    Energy Efficient and Interference Aware Provisioning in Virtualized Server Cluster Environment

    IT service providers, employ server virtualization as a main building block to improve system utilization, improve system manageability, reduce operational costs which includes energy consumption driving economies of scale with shared resources. Virtualization enables co-locating and efficient assignments of virtual servers within the bounds of limited number of heterogeneous physical...

    Provided By Science Productions

  • White Papers // Nov 2013

    Decision Tree Based Occlusion Detection in Face Recognition and Estimation of Human Age Using Back Propagation Neural Network

    Now-a-days a major work from the research community is dedicated to occlusion detection in face verification and age estimation of a human. Human face is robust as it changes within a short span of time. Three kinds of approach exist for classification and recognition. Occlusion detection in face verification is...

    Provided By Science Productions

  • White Papers // Nov 2013

    A Novel Approach for Test Suite Prioritization

    Software testing is an expensive, time consuming, important activity that controls the quality of the software and important part of the software development and the maintenance. In testing the time is spent mainly for generating test cases and to test them. Whenever the software product gets modified, a group of...

    Provided By Science Productions

  • White Papers // Nov 2013

    Analysis of Internet Traffic in Educational Network Based on Users' Preferences

    The demand for internet services and network resources in educational networks are increasing rapidly. Specifically, the revolution of web 2.0 \"Also referred to as the read-write web\" has changed the way of information exchange and distribution. Although web 2.0 has gained attraction in all sectors of the education industry, but...

    Provided By Science Productions

  • White Papers // Jan 2014

    Theoretical and Simulation Approaches for Studying Compensation Strategies of Nonlinear Effects Digital Lightwave Links Using DWDM Technology

    Now-a-days, techniques for education are based on the combination of theoretical formulas, experimental measurement and simulation approaches. Theoretical analysis, experimental and simulation approaches based educations allow developing simple and non expensive tools for the aim of studying complex problems in optical network communication. Theoretical formulas, used to describe the non...

    Provided By Science Productions

  • White Papers // Oct 2013

    A Novel Hybrid Node Localization Algorithm for Wireless Sensor Networks

    Node self-localization is one of the supporting technologies in Wireless Sensor Networks (WSNs). In this paper, a distributed hybrid localization algorithm based on divide-and-conquer and refinement method is proposed. Firstly, the effect of ranging error in the Received Signal Strength (RSS) model on node localization is analyzed and the topology...

    Provided By Science Productions

  • White Papers // Jan 2013

    Secured Requirement Specification Framework (SRSF)

    Generally, software engineers are poorly trained to elicit, analyze and specify security requirements, often confusing them with the architectural security mechanisms that are traditionally used to fulfill them. One of the most ignored parts of a security-enhanced software development lifecycle is the security requirements engineering process. Security should begin at...

    Provided By Science Productions

  • White Papers // May 2011

    Applying Packet Generator for Secure Network Environment

    Viruses and hacker attacks typically generate a recognizable pattern or \"Signature\" of packets. Most of network traffic analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Most traffics analyzers let them set alarms to be triggered when a particular pattern...

    Provided By Science Productions

  • White Papers // Nov 2013

    Distributive Power Migration and Management Algorithm for Cloud Environment

    In cloud computing, the resources are provided as service over the internet on demand basis. The resources such as servers, networks, storage, applications are dynamically scaled and virtualized. The demand grows gradually for each virtual machine in a cloud computing environment over time. So, it is necessary to manage the...

    Provided By Science Productions

  • White Papers // Nov 2013

    3-Dimensional Ear Recognition Based Iterative Closest Point with Stochastic Clustering Matching

    Ear recognition is a new technology and future trend for personal identification. However, the false detection rate and matching recognition are very challenging due to the ear complex geometry. This paper is to introduce a combination of Iterative Closest Point (ICP) and Stochastic Clustering Matching (SCM) algorithm for 3D ears...

    Provided By Science Productions

  • White Papers // Nov 2013

    Comparison Using Particle Swarm Optimization and Genetic Algorithm for Timetable Scheduling

    Lecturer timetable scheduling is an important part in the resource allocation planning. Due to the large amount of transactions and various related constraints have to be taken into account in timetable scheduling process, resource manager team shall need a lot of time to the solve the problem. This research is...

    Provided By Science Productions

  • White Papers // Nov 2013

    Integrating Radio Frequency Identification Technology in Academic Management System

    In this paper, the authors propose building a web and windows based intelligent system using web technologies, biometric and Radio Frequency IDentification technologies (RFID) to strengthen an Academic Management System (AMS) in a campus for monitoring and improving academic performance of teachers and students. A campus mobile phone application will...

    Provided By Science Productions

  • White Papers // Nov 2013

    Two Phase Clustering Method for Leach Protocol for Effective Cluster Head Selection

    A Wireless Sensor Networks (WSN) comprise of a huge quantity of clusters of sensor nodes that can inter communicate with all nodes and with the base station through a wireless link. All clusters are corresponding to a cluster head to provide a direct communication to the base station and in...

    Provided By Science Productions

  • White Papers // Nov 2013

    Ubiquitous Palm Display and Fingertip Tracker System Using OpenCV

    Ubiquitous Computing is the idea of embedding computation onto everyday objects of the environment the people live in. It's the approach towards making technology and computation available everywhere thereby making people interact with abundant information around them in a more natural and friendly manner. The authors' paper, the palm display...

    Provided By Science Productions