Science Productions

Displaying 1-40 of 70 results

  • White Papers // Nov 2011

    Impact of Malicious Nodes Under Different Route Refresh Intervals in Ad Hoc Network

    Ad hoc networks are formed dynamically by group of mobile devices co operating with each other. Intermediate nodes between source and destination act as routers so that source node can communicate with the destination node even if it is out radio range and thus eliminating the necessity of infrastructure. Co...

    Provided By Science Productions

  • White Papers // Aug 2012

    Optimization Techniques to Record Deduplication

    Duplicate record detection is important for data preprocessing and cleaning. Artificial Bee Colony (ABC) is one of the most recently introduced algorithms based on the intelligent foraging behavior of a honey bee swarm. The authors' approach to duplicate detection is the use of ABC algorithm for generating the optimal similarity...

    Provided By Science Productions

  • White Papers // Aug 2012

    Fuzzy Cost Enabled Cluster Based Multipath Routing Algorithm for Mobile Ad-Hoc Networks

    This paper proposes the selection of best paths in Mobile Ad Hoc NETwork (MANET) based on multipath routing with fuzzy cost in respect of the Fuzzy Cost Enabled Cluster based Routing (FCECR). By implementing FCECR, they have made changes to reduce the cost and route discovery overhead for the selection...

    Provided By Science Productions

  • White Papers // Sep 2012

    Principal Component Analysis Based Feature Extraction, Morphological Edge Detection and Localization for Fast Iris Recognition

    This paper involves the Iris Localization based on morphological or set theory which is well in shape detection. Principal Component Analysis (PCA) is used for preprocessing, in which the removal of redundant and unwanted data is done. Applications such as Median Filtering and Adaptive thresholding are used for handling the...

    Provided By Science Productions

  • White Papers // Aug 2012

    Network Planning and Optimization for Multi-Hop Relay Placement in WiMAX Networks

    Wireless access networks can provide high level of quality of services at low network installation budget if the networks are planned by using proper methods. In this paper, the authors developed efficient network planning methods for Wireless Interoperability for Microwave Access (WiMAX) networks in which the multiple hops of relay...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Generic Charging Policy Based Accounting for Web Services

    Metering and charging are basic accounting functions that are essential for commercial usage of web services. Current charging and accounting schemes primarily involve users being charged flat or based on the connection/session time. Accounting management of web services should provide for metering, charging, accounting, billing, payment and auditing. The authors...

    Provided By Science Productions

  • White Papers // Sep 2012

    Impact of Algorithms for the Extraction of Minutiae Points in Fingerprint Biometrics

    As the importance of automatic personal identification applications increases, biometrics particularly fingerprint identification is the most consistent and greatly acknowledged technique. A very important step in automatic fingerprint recognition system is to extract the minutiae points from the input fingerprint images automatically and quickly. Fingerprints from the database FVC2002 (DB1-a)...

    Provided By Science Productions

  • White Papers // Aug 2012

    Wireless Sensor Networks Fault Identification Using Data Association

    Wireless Sensor Networks (WSN) are formed by thousands of lightweight nodes equipped with transducers for capturing information. The captured data are transmitted using multi hop routes to a base station, also called a sink. They can be extensively deployed during emergency response, medical monitoring and mission critical applications requiring extensive...

    Provided By Science Productions

  • White Papers // Oct 2012

    End to End Delay Improvement in Heterogeneous Multicast Network Using Genetic Optimization

    Multicast is a concept of group communication which refers to transmitting the same data or messages from a source to multiple destinations in the network. This one-to-many group communication is a generalization of the concepts of one-to-one unicast and one-to-all broadcast. To deliver data from the sender to all receivers...

    Provided By Science Productions

  • White Papers // Oct 2012

    A Block Cipher Algorithm for Multimedia Content Protection With Random Substitution Using Binary Tree Traversal

    Many people consume multimedia content (images, music, movie) on portable devices like DVD player, MP3 player, Portable Multimedia Player and also through Internet. The conventional algorithms such as DES and AES cannot be used directly in multimedia data, since multimedia data are repeatedly have high redundancy, large-volumes and require real-time...

    Provided By Science Productions

  • White Papers // Aug 2012

    Evaluation on Score Reliability for Biometric Speaker Authentication Systems

    Fusion weight tuning based on score reliability is imperative in order to ensure the performances of multibiometric systems are sustained. In this paper, two variant of conditions i.e., different performances of individual subsystems and inconsistent quality of test samples are experimented to multibiometric systems. By applying multialgorithm scheme, two types...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Methodological Framework for Software Safety in Safety Critical Computer Systems

    Software safety must deal with the principles of safety management, safety engineering and software engineering for developing safety-critical computer systems, with the target of making the system safe, risk-free and fail-safe in addition to provide a clarified differentiation for assessing and evaluating the risk, with the principles of software risk...

    Provided By Science Productions

  • White Papers // Aug 2012

    Dynamic Scheduling for Cloud Reliability Using Transportation Problem

    Cloud is purely a dynamic environment and the existing task scheduling algorithms are mostly static and considered various parameters like time, cost, make span, speed, scalability, throughput, resource utilization, scheduling success rate and so on. Available scheduling algorithms are mostly heuristic in nature and more complex, time consuming and does...

    Provided By Science Productions

  • White Papers // Aug 2012

    Reconfigurable Hardware Architecture for Network Intrusion Detection System

    Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention. The use of reconfigurable hardware for network security applications has great strides as Field Programmable Gate Array (FPGA) devices have provided larger and faster resources. This proposes architecture called "BV-TCAM" is presented, which is implemented for an FPGA-based Network...

    Provided By Science Productions

  • White Papers // Jul 2012

    A Metadata Based Storage Model for Securing Data in Cloud Environment

    Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring...

    Provided By Science Productions

  • White Papers // Dec 2013

    An Algorithm for Mining Usable Rules Using a Holistic Swarm Based Approach

    Evolutionary algorithms are capable of finding near optimal solutions to problems which are intractable to solve using conventional methods. One such problem is to accurately classify patients using rule mining methodology while controlling the size of output rules. A massive amount of data pertaining to medicine is generated and recorded...

    Provided By Science Productions

  • White Papers // Dec 2013

    Partial Rule Match for Filtering Rules in Associative Classification

    In this paper, the authors propose a new method to enhance the accuracy of Modified Multi-class Classification based on Association Rule (MMCAR) classifier. They introduce a Partial Rule Match Filtering (PRMF) method that allows a minimal match of the items in the rule's body in order for the rule to...

    Provided By Science Productions

  • White Papers // Sep 2013

    Study and Analysis of Routing Protocols in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) is a network without a fixed Infrastructure. In wireless networks users expect to get access to the network security and to exchange information anytime and anywhere. The ad hoc wireless network consists of mobile networks which creates architecture for communication without the help of traditional fixed-position...

    Provided By Science Productions

  • White Papers // Oct 2013

    Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks

    Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility...

    Provided By Science Productions

  • White Papers // Jul 2013

    Development of an Energyefficient, Secure and Reliable Wireless Sensor Networks Routing Protocol Based on Data Aggregation and User Authentication

    Data aggregation protocols are required in Wireless Sensor Networks (WSNs) to improve the data accuracy and extend the network lifetime by reducing the energy consumption. The existing Data Aggregation-Optimal LEACH (DAO-LEACH) protocol for WSN is enhanced in terms of security and fault-tolerance based on Gracefully Degraded Data Aggregation (GDDA) to...

    Provided By Science Productions

  • White Papers // Nov 2013

    Research on Security Protocol for Collaborating Mobile Agents in Network Intrusion Detection Systems

    Despite the popularity of mobile agents in academic and commercial arena, the security issues associated with them have hindered their adoption on large scale distributed applications. However, researchers are making relentless effort to overcome the security impediments so that the interesting properties inherent in mobile agent application, especially in the...

    Provided By Science Productions

  • White Papers // Feb 2013

    Flooding Attack Aware Secure AODV

    Providing security in a Mobile Ad-hoc NETwork (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth....

    Provided By Science Productions

  • White Papers // Sep 2013

    Lightweight Vigilant Procedure to Implement Security Measures in Highly Roving Military Operations

    The performance of Mobile Ad-hoc NETwork (MANET) becomes questionable in highly roving and mission critical application like military operation. Security measures like encryption, authentication, digital signature has been proposed for MANET. However, all those mechanisms need some kind of static infrastructure and it is extremely difficult to implement such an...

    Provided By Science Productions

  • White Papers // Oct 2013

    Smart Travelling with Radio Frequency Identification

    Radio Frequency IDentification (RFID) technology is being widely used now-a-days and is becoming more popular with every passing day. There are varied applications of this technology in various fields such as industry, communication, travel and transportation. Roads, rail ways, air traffic and container vessel shipping all share underlying abstractions of...

    Provided By Science Productions

  • White Papers // Nov 2013

    Design and Implementation of a Privacy Preserved Off-Premises Cloud Storage

    Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as healthcare and payment card industry where confidentiality of information is a vital act, are not assertive to trust the security techniques and privacy...

    Provided By Science Productions

  • White Papers // Nov 2013

    Permutation of HTTPI and HTTPS in Web Services Against Attacks for Security Enhancement

    The Hyper Text Transfer Protocol (HTTP) protocol plays a vital role in Web Services Security. Though the HTTPs provide excellent security, they are not flexible enough to allow caches. HTTPi provides high integrity and low security whereas HTTPs provide low integrity and high security. The goal of WS activity is...

    Provided By Science Productions

  • White Papers // Nov 2013

    Protecting the Online User's Information Against Phishing Attacks Using Dynamic Encryption Techniques

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. Phishing has seen an...

    Provided By Science Productions

  • White Papers // Oct 2013

    A Novel Approach for Information Security in Ad Hoc Networks Through Secure Key Management

    Ad hoc networks provide flexible and adaptive networks with no fixed infrastructure and dynamic topology. Owe to the vulnerability nature of ad hoc network, there are lots of security threats that diminish the development of ad hoc networks. Therefore, to provide security for information of users and to preserve their...

    Provided By Science Productions

  • White Papers // Feb 2013

    Performance Evaluation of Chaotic Encryption Technique

    Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a...

    Provided By Science Productions

  • White Papers // May 2013

    Evaluation Metrics for Wireless Sensor Network Security: Algorithms Review and Software Tool

    Wireless Sensor Networks (WSN) is currently receiving a significant attention due to their potential impact into several real life applications such as military and home automation technology. This paper is a complementary part of what's discussed. In this paper, the authors propose a software tool to simulate and evaluate the...

    Provided By Science Productions

  • White Papers // May 2013

    Protocols for Secure Routing and Transmission in Mobile Ad Hoc Network: A Review

    Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability...

    Provided By Science Productions

  • White Papers // Apr 2013

    Home Users Security and the Web Browser Inbuilt Settings, Framework to Setup It Automatically

    The authors are living in the electronic age where electronic transactions such as e-mail, e-banking, e-commerce and e-learning becoming more and more prominent. To access online for this services, the web browser is today's almost unique software used. These days' hackers know that browsers are installed into all computers and...

    Provided By Science Productions

  • White Papers // Aug 2013

    Message Authentication Code Based Secure Group Key Management Protocol for Mobile Ad Hoc Networks

    A mobile ad hoc network is a group of nodes which are communicating with each other with the use of radio frequencies. When there is high movement of mobile nodes, the nodes find difficult to reach other nodes. If the data are exchanged between nodes when there is high mobility,...

    Provided By Science Productions

  • White Papers // Oct 2013

    An In-Depth Analysis on Integrating Campus Radio Frequency Identification System on Clouds for Enhancing Security

    Several measures had been taken to ameliorate security technology at campuses using latest technologies available. Radio Frequency IDentification (RFID) technology in campuses is mainly used for recording attendance which is further extended to activity monitoring and individual security. This paper proposes a framework of RFID integrated solution for enhanced campus...

    Provided By Science Productions

  • White Papers // Nov 2013

    Critical Review of Openstack Security: Issues and Weaknesses

    In this paper, the authors examine the state of both cloud computing security in general and OpenStack in particular. Conducting a reassessment of cloud computing security can provide a greater understanding of how cloud computing functions and what types of security issues arise therein. This paper is divided into two...

    Provided By Science Productions

  • White Papers // Apr 2013

    Comparative Study of Scheduling Al-Gorithms in Cloud Computing Environment

    An essential requirement in cloud computing environment is scheduling the current jobs to be executed with the given constraints. The scheduler should order the jobs in a way where balance between improving the quality of services and at the same time maintaining the efficiency and fairness among the jobs. Thus,...

    Provided By Science Productions

  • White Papers // May 2013

    Performance Improvement in Cloud Computing Using Resource Clustering

    Cloud computing is a computing paradigm in which the various tasks are assigned to a combination of connections, software and services that can be accessed over the network. The computing resources and services can be efficiently delivered and utilized, making the vision of computing utility realizable. In various applications, execution...

    Provided By Science Productions

  • White Papers // Oct 2013

    Effective Black Hole Attacks in MANETs

    Black hole or packet drop attack is a denial of service attack on routing protocols in which malicious nodes fabricate routing information, attract packets routed through them and then deliberately drop these packets. Most of the black hole attack simulations are performed by constantly fabricating routing information and thus consistently...

    Provided By Science Productions

  • White Papers // Nov 2013

    An Approach to Mitigate Denial of Service Attacks in IEEE 802.11 Networks

    Wireless networks are widely deployed and have many uses, for example in critical embedded systems. The applications of this kind of network meets the common needs of most embedded systems and addressing the particularities of each scenario, such as limitations of computing resources and energy supply. Problems such as denial...

    Provided By Science Productions

  • White Papers // Jul 2013

    The Dynamic Nonce Based Authentication Scheme to Defend Intermediary Attack for Web Services

    Now-a-days, web services have used drastically for various online applications like banking, e-bill processing. All online services need robust security architecture for handling sensitive data like user name, password. But, the web service has security problems that need to be solved. The existing security scheme lacks to defend the attacks...

    Provided By Science Productions