Science Productions

Displaying 1-40 of 70 results

  • White Papers // Oct 2013

    A Novel Approach for Information Security in Ad Hoc Networks Through Secure Key Management

    Ad hoc networks provide flexible and adaptive networks with no fixed infrastructure and dynamic topology. Owe to the vulnerability nature of ad hoc network, there are lots of security threats that diminish the development of ad hoc networks. Therefore, to provide security for information of users and to preserve their...

    Provided By Science Productions

  • White Papers // Feb 2013

    Performance Evaluation of Chaotic Encryption Technique

    Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a...

    Provided By Science Productions

  • White Papers // Nov 2013

    Permutation of HTTPI and HTTPS in Web Services Against Attacks for Security Enhancement

    The Hyper Text Transfer Protocol (HTTP) protocol plays a vital role in Web Services Security. Though the HTTPs provide excellent security, they are not flexible enough to allow caches. HTTPi provides high integrity and low security whereas HTTPs provide low integrity and high security. The goal of WS activity is...

    Provided By Science Productions

  • White Papers // Nov 2013

    Protecting the Online User's Information Against Phishing Attacks Using Dynamic Encryption Techniques

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. Phishing has seen an...

    Provided By Science Productions

  • White Papers // Jul 2013

    The Dynamic Nonce Based Authentication Scheme to Defend Intermediary Attack for Web Services

    Now-a-days, web services have used drastically for various online applications like banking, e-bill processing. All online services need robust security architecture for handling sensitive data like user name, password. But, the web service has security problems that need to be solved. The existing security scheme lacks to defend the attacks...

    Provided By Science Productions

  • White Papers // Nov 2013

    Combating Cyber Terrorism-Assessment of Log for Malicious Signatures

    Enhancing security to the networks and preventing the cyber attacks is a major issue in all domains. In this paper, a new class of cyber terrorism is addressed where mischievous and malicious behavior is the root cause for the modification of network data stored in an open database. An attempt...

    Provided By Science Productions

  • White Papers // May 2013

    Research Proposal: An Intrusion Detection System Alert Reduction and Assessment Framework Based on Data Mining

    The Intrusion Detection System (IDS) generates huge amounts of alerts that are mostly false positives. The abundance of false positive alerts makes it difficult for the security analyst to identify successful attacks and to take remedial actions. Such alerts to have not been classified in accordance with their degree of...

    Provided By Science Productions

  • White Papers // Oct 2013

    Deteriorating Distributed Denial of Service Attack by Recovering Zombies Using Penalty Scheme

    Resource of victim impounded by DDoS attack leads the victim to series monetary loss apart from various other ill-effects. Already lot of solutions came up in technological aspects almost neglecting the economical aspects. Hence, there is not yet a proper method to make the zombies accountable to the economical loss...

    Provided By Science Productions

  • White Papers // Jan 2013

    Privacy Preservation for File Sharing Scheme Using Secured File Block ID with Binary Trees

    Privacy, the security of information from unauthorized access is gradually needed on the Internet and yet progressively more important while each user acts as both consumer and producer. The lack of privacy is mainly employed for peer-to peer file sharing applications, in which users in the network shared file with...

    Provided By Science Productions

  • White Papers // Aug 2013

    An Efficient Autonomous Key Management with Reduced Communication/Computation Costs in Mobile Ad Hoc Network

    A primary concern in Mobile Ad-hoc NETworks (MANETs) is security. Secret sharing is an effective way to distribute a secret among n parties, where each party holds one piece of the secret. A number of key management schemes have been proposed for MANETs. However, the secret sharing to control key...

    Provided By Science Productions

  • White Papers // Jul 2013

    A Role of Intrusion Detection System for Wireless LAN Using Various Schemes and Related Issues

    The advancement in network based technology and augmented dependability of the people everyday life on this technology. During recent years, number of attacks on networks has intensely increased. Hence interest in network intrusion detection has increased among the researchers. This study assesses different kinds of IDS and inclines preemptive procedures....

    Provided By Science Productions

  • White Papers // Apr 2013

    A Model for Securing Sharing Information Across the Supply Chain

    Supply Chain Management (SCM) is impacted by information technology both directly or indirectly. Sharing information across the supply chain not only supports internal operations but also collaboration among supply partners. So, securing information has a critical role in creating confidence in organizations to share their data across the supply chain....

    Provided By Science Productions

  • White Papers // Oct 2013

    Effective Black Hole Attacks in MANETs

    Black hole or packet drop attack is a denial of service attack on routing protocols in which malicious nodes fabricate routing information, attract packets routed through them and then deliberately drop these packets. Most of the black hole attack simulations are performed by constantly fabricating routing information and thus consistently...

    Provided By Science Productions

  • White Papers // Nov 2013

    An Approach to Mitigate Denial of Service Attacks in IEEE 802.11 Networks

    Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial...

    Provided By Science Productions

  • White Papers // May 2013

    Secured Routing with Authentication in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes that dynamically forms a temporary network without any fixed infrastructure. Each node participates in the ad hoc routing protocol that helps it to discover multi-hop paths through the network to any node. Security challenges have become a primary...

    Provided By Science Productions

  • White Papers // Jan 2014

    Security Breach in Trading System-Countermeasure Using IPTraceback

    Recently, economic scenario is often facing security breach that has heavy impact on the financial soundness of a company particularly, stock prices on firms. The utmost consequence being the whole business comes to a standstill. From the estimates attributed by the financial sector, it has been inferred that the loss...

    Provided By Science Productions

  • White Papers // Nov 2013

    Optimizing Batch Rekeying Interval for Secure Group Communication Based on Queuing Model

    Rapid growth of Internet spawns many group oriented multicast applications like internet pay TV, news dissemination and stock quote system. The fortes of these applications are the support of dynamic, scalable group membership and group members are geographically divergent. As members of the group move in and out, an imperative...

    Provided By Science Productions

  • White Papers // Dec 2013

    A New Cloud Based Supervisory Control and Data Acquisition Implementation to Enhance the Level of Security Using Testbed

    Now-a-days, cloud computing is an important and hot topic in arena of information technology and computer system. Several companies and educational institutes have been deployed cloud infrastructures to overcome their problems such as easy data access, software updates with minimal cost, large or unlimited storage, efficient cost factor, backup storage...

    Provided By Science Productions

  • White Papers // Dec 2013

    Evaluation of Service Transactions and Selection of Quality Offered Services in a Business Environment

    The application of service oriented architecture in business is to meet the best quality requirements to the customers and providers. Where, service evaluations are carried out based on the quality attributes of scalability, usability, security, performance. In past many evaluation systems have been proposed for business applications with different criteria....

    Provided By Science Productions

  • White Papers // Dec 2013

    Partial Rule Match for Filtering Rules in Associative Classification

    In this paper, the authors propose a new method to enhance the accuracy of Modified Multi-class Classification based on Association Rule (MMCAR) classifier. They introduce a Partial Rule Match Filtering (PRMF) method that allows a minimal match of the items in the rule's body in order for the rule to...

    Provided By Science Productions

  • White Papers // Dec 2013

    An Algorithm for Mining Usable Rules Using a Holistic Swarm Based Approach

    Evolutionary algorithms are capable of finding near optimal solutions to problems which are intractable to solve using conventional methods. One such problem is to accurately classify patients using rule mining methodology while controlling the size of output rules. A massive amount of data pertaining to medicine is generated and recorded...

    Provided By Science Productions

  • White Papers // Dec 2013

    Cluster Based Cache Consistency Using Agent Technique in Mobile Environment

    Caching is an essential mechanism in mobile environment. Mobile node makes access dynamic changing data object to their server and to get the interested data to keep their own as local copies in the cache. If the server database is updated, the data cached in mobile client is invalidated and...

    Provided By Science Productions

  • White Papers // Dec 2013

    Server Failures Enabled Javaspaces Service

    Machine crashes and network partintions are major problems while running a distributed application. It is important to deal with failures that are caused by such events within runtime. Otherwise, it will be a must to restart the application from the beginning. A possible solution to this problem is to introduce...

    Provided By Science Productions

  • White Papers // Apr 2014

    Efficient Ranked and Secure File Retrieval in Cloud Computing

    Cloud computing facilitates extremely scalable services that can be consumed over internet. An important aspect of the cloud services is that user data are stored remotely in unknown machines in which users do not posses or manage. Since the data's are stored remotely, the authors have to keep in mind...

    Provided By Science Productions

  • White Papers // Jun 2009

    Multi Microkernel Operating Systems for Multi-Core Processors

    In the midst of the huge development in processors industry as a response to the increasing demand for high-speed processors manufacturers were able to achieve the goal of producing the required processors, but this industry disappointed hopes, because it faced problems not amenable to solution, such as complexity, hard management...

    Provided By Science Productions

  • White Papers // Nov 2011

    Impact of Malicious Nodes Under Different Route Refresh Intervals in Ad Hoc Network

    Ad hoc networks are formed dynamically by group of mobile devices co operating with each other. Intermediate nodes between source and destination act as routers so that source node can communicate with the destination node even if it is out radio range and thus eliminating the necessity of infrastructure. Co...

    Provided By Science Productions

  • White Papers // Aug 2012

    Optimization Techniques to Record Deduplication

    Duplicate record detection is important for data preprocessing and cleaning. Artificial Bee Colony (ABC) is one of the most recently introduced algorithms based on the intelligent foraging behavior of a honey bee swarm. The authors' approach to duplicate detection is the use of ABC algorithm for generating the optimal similarity...

    Provided By Science Productions

  • White Papers // Aug 2012

    Fuzzy Cost Enabled Cluster Based Multipath Routing Algorithm for Mobile Ad-Hoc Networks

    This paper proposes the selection of best paths in Mobile Ad Hoc NETwork (MANET) based on multipath routing with fuzzy cost in respect of the Fuzzy Cost Enabled Cluster based Routing (FCECR). By implementing FCECR, they have made changes to reduce the cost and route discovery overhead for the selection...

    Provided By Science Productions

  • White Papers // Sep 2012

    Principal Component Analysis Based Feature Extraction, Morphological Edge Detection and Localization for Fast Iris Recognition

    This paper involves the Iris Localization based on morphological or set theory which is well in shape detection. Principal Component Analysis (PCA) is used for preprocessing, in which the removal of redundant and unwanted data is done. Applications such as Median Filtering and Adaptive thresholding are used for handling the...

    Provided By Science Productions

  • White Papers // Aug 2012

    Network Planning and Optimization for Multi-Hop Relay Placement in WiMAX Networks

    Wireless access networks can provide high level of quality of services at low network installation budget if the networks are planned by using proper methods. In this paper, the authors developed efficient network planning methods for Wireless Interoperability for Microwave Access (WiMAX) networks in which the multiple hops of relay...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Generic Charging Policy Based Accounting for Web Services

    Metering and charging are basic accounting functions that are essential for commercial usage of web services. Current charging and accounting schemes primarily involve users being charged flat or based on the connection/session time. Accounting management of web services should provide for metering, charging, accounting, billing, payment and auditing. The authors...

    Provided By Science Productions

  • White Papers // Sep 2012

    Impact of Algorithms for the Extraction of Minutiae Points in Fingerprint Biometrics

    As the importance of automatic personal identification applications increases, biometrics particularly fingerprint identification is the most consistent and greatly acknowledged technique. A very important step in automatic fingerprint recognition system is to extract the minutiae points from the input fingerprint images automatically and quickly. Fingerprints from the database FVC2002 (DB1-a)...

    Provided By Science Productions

  • White Papers // Aug 2012

    Wireless Sensor Networks Fault Identification Using Data Association

    Wireless Sensor Networks (WSN) are formed by thousands of lightweight nodes equipped with transducers for capturing information. The captured data are transmitted using multi hop routes to a base station, also called a sink. They can be extensively deployed during emergency response, medical monitoring and mission critical applications requiring extensive...

    Provided By Science Productions

  • White Papers // Oct 2012

    End to End Delay Improvement in Heterogeneous Multicast Network Using Genetic Optimization

    Multicast is a concept of group communication which refers to transmitting the same data or messages from a source to multiple destinations in the network. This one-to-many group communication is a generalization of the concepts of one-to-one unicast and one-to-all broadcast. To deliver data from the sender to all receivers...

    Provided By Science Productions

  • White Papers // Oct 2012

    A Block Cipher Algorithm for Multimedia Content Protection With Random Substitution Using Binary Tree Traversal

    Many people consume multimedia content (images, music, movie) on portable devices like DVD player, MP3 player, Portable Multimedia Player and also through Internet. The conventional algorithms such as DES and AES cannot be used directly in multimedia data, since multimedia data are repeatedly have high redundancy, large-volumes and require real-time...

    Provided By Science Productions

  • White Papers // Aug 2012

    Evaluation on Score Reliability for Biometric Speaker Authentication Systems

    Fusion weight tuning based on score reliability is imperative in order to ensure the performances of multibiometric systems are sustained. In this paper, two variant of conditions i.e., different performances of individual subsystems and inconsistent quality of test samples are experimented to multibiometric systems. By applying multialgorithm scheme, two types...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Methodological Framework for Software Safety in Safety Critical Computer Systems

    Software safety must deal with the principles of safety management, safety engineering and software engineering for developing safety-critical computer systems, with the target of making the system safe, risk-free and fail-safe in addition to provide a clarified differentiation for assessing and evaluating the risk, with the principles of software risk...

    Provided By Science Productions

  • White Papers // Aug 2012

    Dynamic Scheduling for Cloud Reliability Using Transportation Problem

    Cloud is purely a dynamic environment and the existing task scheduling algorithms are mostly static and considered various parameters like time, cost, make span, speed, scalability, throughput, resource utilization, scheduling success rate and so on. Available scheduling algorithms are mostly heuristic in nature and more complex, time consuming and does...

    Provided By Science Productions

  • White Papers // Aug 2012

    Reconfigurable Hardware Architecture for Network Intrusion Detection System

    Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention. The use of reconfigurable hardware for network security applications has great strides as Field Programmable Gate Array (FPGA) devices have provided larger and faster resources. This proposes architecture called "BV-TCAM" is presented, which is implemented for an FPGA-based Network...

    Provided By Science Productions

  • White Papers // Jul 2012

    A Metadata Based Storage Model for Securing Data in Cloud Environment

    Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring...

    Provided By Science Productions