Science Productions

Displaying 1-40 of 266 results

  • White Papers // Nov 2011

    Impact of Malicious Nodes Under Different Route Refresh Intervals in Ad Hoc Network

    Ad hoc networks are formed dynamically by group of mobile devices co operating with each other. Intermediate nodes between source and destination act as routers so that source node can communicate with the destination node even if it is out radio range and thus eliminating the necessity of infrastructure. Co...

    Provided By Science Productions

  • White Papers // Aug 2012

    Optimization Techniques to Record Deduplication

    Duplicate record detection is important for data preprocessing and cleaning. Artificial Bee Colony (ABC) is one of the most recently introduced algorithms based on the intelligent foraging behavior of a honey bee swarm. The authors' approach to duplicate detection is the use of ABC algorithm for generating the optimal similarity...

    Provided By Science Productions

  • White Papers // Aug 2012

    Fuzzy Cost Enabled Cluster Based Multipath Routing Algorithm for Mobile Ad-Hoc Networks

    This paper proposes the selection of best paths in Mobile Ad Hoc NETwork (MANET) based on multipath routing with fuzzy cost in respect of the Fuzzy Cost Enabled Cluster based Routing (FCECR). By implementing FCECR, they have made changes to reduce the cost and route discovery overhead for the selection...

    Provided By Science Productions

  • White Papers // Sep 2012

    Principal Component Analysis Based Feature Extraction, Morphological Edge Detection and Localization for Fast Iris Recognition

    This paper involves the Iris Localization based on morphological or set theory which is well in shape detection. Principal Component Analysis (PCA) is used for preprocessing, in which the removal of redundant and unwanted data is done. Applications such as Median Filtering and Adaptive thresholding are used for handling the...

    Provided By Science Productions

  • White Papers // Aug 2012

    Network Planning and Optimization for Multi-Hop Relay Placement in WiMAX Networks

    Wireless access networks can provide high level of quality of services at low network installation budget if the networks are planned by using proper methods. In this paper, the authors developed efficient network planning methods for Wireless Interoperability for Microwave Access (WiMAX) networks in which the multiple hops of relay...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Generic Charging Policy Based Accounting for Web Services

    Metering and charging are basic accounting functions that are essential for commercial usage of web services. Current charging and accounting schemes primarily involve users being charged flat or based on the connection/session time. Accounting management of web services should provide for metering, charging, accounting, billing, payment and auditing. The authors...

    Provided By Science Productions

  • White Papers // Sep 2012

    Impact of Algorithms for the Extraction of Minutiae Points in Fingerprint Biometrics

    As the importance of automatic personal identification applications increases, biometrics particularly fingerprint identification is the most consistent and greatly acknowledged technique. A very important step in automatic fingerprint recognition system is to extract the minutiae points from the input fingerprint images automatically and quickly. Fingerprints from the database FVC2002 (DB1-a)...

    Provided By Science Productions

  • White Papers // Aug 2012

    Wireless Sensor Networks Fault Identification Using Data Association

    Wireless Sensor Networks (WSN) are formed by thousands of lightweight nodes equipped with transducers for capturing information. The captured data are transmitted using multi hop routes to a base station, also called a sink. They can be extensively deployed during emergency response, medical monitoring and mission critical applications requiring extensive...

    Provided By Science Productions

  • White Papers // Oct 2012

    End to End Delay Improvement in Heterogeneous Multicast Network Using Genetic Optimization

    Multicast is a concept of group communication which refers to transmitting the same data or messages from a source to multiple destinations in the network. This one-to-many group communication is a generalization of the concepts of one-to-one unicast and one-to-all broadcast. To deliver data from the sender to all receivers...

    Provided By Science Productions

  • White Papers // Oct 2012

    A Block Cipher Algorithm for Multimedia Content Protection With Random Substitution Using Binary Tree Traversal

    Many people consume multimedia content (images, music, movie) on portable devices like DVD player, MP3 player, Portable Multimedia Player and also through Internet. The conventional algorithms such as DES and AES cannot be used directly in multimedia data, since multimedia data are repeatedly have high redundancy, large-volumes and require real-time...

    Provided By Science Productions

  • White Papers // Aug 2012

    Evaluation on Score Reliability for Biometric Speaker Authentication Systems

    Fusion weight tuning based on score reliability is imperative in order to ensure the performances of multibiometric systems are sustained. In this paper, two variant of conditions i.e., different performances of individual subsystems and inconsistent quality of test samples are experimented to multibiometric systems. By applying multialgorithm scheme, two types...

    Provided By Science Productions

  • White Papers // Aug 2012

    A Methodological Framework for Software Safety in Safety Critical Computer Systems

    Software safety must deal with the principles of safety management, safety engineering and software engineering for developing safety-critical computer systems, with the target of making the system safe, risk-free and fail-safe in addition to provide a clarified differentiation for assessing and evaluating the risk, with the principles of software risk...

    Provided By Science Productions

  • White Papers // Aug 2012

    Dynamic Scheduling for Cloud Reliability Using Transportation Problem

    Cloud is purely a dynamic environment and the existing task scheduling algorithms are mostly static and considered various parameters like time, cost, make span, speed, scalability, throughput, resource utilization, scheduling success rate and so on. Available scheduling algorithms are mostly heuristic in nature and more complex, time consuming and does...

    Provided By Science Productions

  • White Papers // Aug 2012

    Reconfigurable Hardware Architecture for Network Intrusion Detection System

    Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention. The use of reconfigurable hardware for network security applications has great strides as Field Programmable Gate Array (FPGA) devices have provided larger and faster resources. This proposes architecture called "BV-TCAM" is presented, which is implemented for an FPGA-based Network...

    Provided By Science Productions

  • White Papers // Jul 2012

    A Metadata Based Storage Model for Securing Data in Cloud Environment

    Enterprises are migrating to the cloud environment at a faster pace. Security of information that is being processed by the applications and ultimately getting stored in the data centers are of big concerns of this newly evolving environment. The security of the data is a concern not only during transferring...

    Provided By Science Productions

  • White Papers // Nov 2010

    Integrated Quantum and Classical Key Scheme for Two Servers Password Authentication

    The two-server password authentication architecture presented has control server and service server. The control server is controlled by a passive adversary while the service server is controlled by an active adversary. A single point of vulnerability, as in the existing password systems, is totally eliminated. Work with today's peer to...

    Provided By Science Productions

  • White Papers // Oct 2012

    Evaluating the Strengths and Weaknesses of Mining Audit Data for Automated Models for Intrusion Detection in Tcpdump and Basic Security Module Data

    Intrusion Detection System (IDS) have become an important component of infrastructure protection mechanism to secure the current and emerging networks, its services and applications by detecting, alerting and taking necessary actions against the malicious activities. The network size, technology diversities and security policies make networks more challenging and hence there...

    Provided By Science Productions

  • White Papers // Aug 2012

    Routing Based Data Security in Mobile Ad Hoc Network Using Group Key Management

    A Mobile Ad-hoc NETwork (MANET) is a self-organizing system of mobile devices followed an infrastructure less framework associated by wireless links. In MANET, there is a possibility of packet data to get lost or hacked by an attacker. So, to improve a secure communication over MANET from attackers, several techniques...

    Provided By Science Productions

  • White Papers // Nov 2012

    Classification of Attacks on Embedded Systems

    The current growth of the number of Embedded Systems (ES) and their use in sensitive systems attract the attention of attackers. They are exposed to real threats and incur significant risks especially when they are involved in specific military or industrial systems. It is important to study the subject from...

    Provided By Science Productions

  • White Papers // Dec 2011

    Supporting Best Practices and Standards for Information Technology Infrastructure Library

    There are several IT best practices and IT standards, which are independently supporting enterprises. Some of them have similarities and other differ from each other. This paper discusses these best practices and standards in contrast with ITIL. CMMI, CobiT, eTOM, ISO 9000, ISO/IEC 17799, Malcolm Baldrige and Six Sigma will...

    Provided By Science Productions

  • White Papers // Jan 2006

    An Enhanced Secure and Scalable Model for Enterprise Applications Using Automated Monitoring

    E-Business must be highly secured and scalable to provide efficient services to millions of clients on the web. This paper proposes a new approach based on shared objects to improve security and mobile agents to improve scalability. The e-business uses shared objects and mobile agents to update the clients automatically...

    Provided By Science Productions

  • White Papers // Jan 2013

    A Secure Protocol Based on a Sedentary Agent for Mobile Agent Environments

    The main challenge when deploying mobile agent environments pertains to security issues concerning mobile agents and their executive platform. This paper proposes a secure protocol which protects mobile agents against attacks from malicious hosts in these environments. Protection is based on the perfect cooperation of a sedentary agent running inside...

    Provided By Science Productions

  • White Papers // May 2011

    Applying Packet Generator for Secure Network Environment

    Viruses and hacker attacks typically generate a recognizable pattern or \"Signature\" of packets. Most of network traffic analyzer can identify these packets and alert the administrator to their presence on the network via email or page. Most traffics analyzers let them set alarms to be triggered when a particular pattern...

    Provided By Science Productions

  • White Papers // Jan 2013

    Secured Requirement Specification Framework (SRSF)

    Generally, software engineers are poorly trained to elicit, analyze and specify security requirements, often confusing them with the architectural security mechanisms that are traditionally used to fulfill them. One of the most ignored parts of a security-enhanced software development lifecycle is the security requirements engineering process. Security should begin at...

    Provided By Science Productions

  • White Papers // Aug 2009

    Message Based Random Variable Length Key Encryption Algorithm

    A block ciphers provides confidentiality in cryptography but cryptanalysis of the classical block ciphers demonstrated some old weaknesses grabbing a partial key in any stage of encryption procedure leads to reconstructing the whole key. Exhaustive key search shows that key generation should be indeterminist and random for each round. Matching...

    Provided By Science Productions

  • White Papers // Dec 2012

    Secured Disclosure of Sensitive Data in Data Mining Techniques

    Recent advances in data collection, data dissemination and related technologies have inaugurated a new era of research where existing data mining algorithms should be reconsidered from the point of view of securing sensitive data. People have become increasingly unwilling to share their data. This frequently results in individuals either refusing...

    Provided By Science Productions

  • White Papers // Apr 2013

    A Framework for Simple Object Access Protocol Messages to Detect Expansion Attacks for Secure Webservice

    The world has shrunk in this internet era. the applications in the internet use xml and web services which are simple, but powerful standards that enable applications to more efficiently communicate with each other. Unfortunately this advantage is coupled with concerns of web services security. All the services provided by...

    Provided By Science Productions

  • White Papers // Jul 2009

    Priority and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Network

    Sensor nodes are easily exposed to many attacks since it were deployed in unattended adversarial environment with no global addressing and used for critical applications such as battlefield surveillance and emergency response. While the sensor also needs to act as a router to relay a message to a required recipient,...

    Provided By Science Productions

  • White Papers // Oct 2013

    Design of a Dual Keyboard

    The design of a computer keyboard with dual function is proposed. This computer keyboard called Dual Keyboard can function both as a normal keyboard and as a pressure sensitive keyboard. The proposed device has a switch that decides the function. The keyboard makes use of sensors placed beneath the keys...

    Provided By Science Productions

  • White Papers // May 2013

    Performance Improvement in Cloud Computing Using Resource Clustering

    Cloud computing is a computing paradigm in which the various tasks are assigned to a combination of connections, software and services that can be accessed over the network. The computing resources and services can be efficiently delivered and utilized, making the vision of computing utility realizable. In various applications, execution...

    Provided By Science Productions

  • White Papers // Apr 2013

    Comparative Study of Scheduling Al-Gorithms in Cloud Computing Environment

    An essential requirement in cloud computing environment is scheduling the current jobs to be executed with the given constraints. The scheduler should order the jobs in a way where balance between improving the quality of services and at the same time maintaining the efficiency and fairness among the jobs. Thus,...

    Provided By Science Productions

  • White Papers // Nov 2013

    Critical Review of Openstack Security: Issues and Weaknesses

    In this paper, the authors examine the state of both cloud computing security in general and OpenStack in particular. Conducting a reassessment of cloud computing security can provide a greater understanding of how cloud computing functions and what types of security issues arise therein. This paper is divided into two...

    Provided By Science Productions

  • White Papers // Oct 2013

    An In-Depth Analysis on Integrating Campus Radio Frequency Identification System on Clouds for Enhancing Security

    Several measures had been taken to ameliorate security technology at campuses using latest technologies available. Radio Frequency IDentification (RFID) technology in campuses is mainly used for recording attendance which is further extended to activity monitoring and individual security. This paper proposes a framework of RFID integrated solution for enhanced campus...

    Provided By Science Productions

  • White Papers // Oct 2013

    Smart Travelling with Radio Frequency Identification

    Radio Frequency IDentification (RFID) technology is being widely used now-a-days and is becoming more popular with every passing day. There are varied applications of this technology in various fields such as industry, communication, travel and transportation. Roads, rail ways, air traffic and container vessel shipping all share underlying abstractions of...

    Provided By Science Productions

  • White Papers // Nov 2013

    Design and Implementation of a Privacy Preserved Off-Premises Cloud Storage

    Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as healthcare and payment card industry where confidentiality of information is a vital act, are not assertive to trust the security techniques and privacy...

    Provided By Science Productions

  • White Papers // Feb 2013

    Flooding Attack Aware Secure AODV

    Providing security in a Mobile Ad-hoc NETwork (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth....

    Provided By Science Productions

  • White Papers // Sep 2013

    Lightweight Vigilant Procedure to Implement Security Measures in Highly Roving Military Operations

    The performance of Mobile Ad-hoc NETwork (MANET) becomes questionable in highly roving and mission critical application like military operation. Security measures like encryption, authentication, digital signature has been proposed for MANET. However, all those mechanisms need some kind of static infrastructure and it is extremely difficult to implement such an...

    Provided By Science Productions

  • White Papers // Jul 2013

    Development of an Energyefficient, Secure and Reliable Wireless Sensor Networks Routing Protocol Based on Data Aggregation and User Authentication

    Data aggregation protocols are required in Wireless Sensor Networks (WSNs) to improve the data accuracy and extend the network lifetime by reducing the energy consumption. The existing Data Aggregation-Optimal LEACH (DAO-LEACH) protocol for WSN is enhanced in terms of security and fault-tolerance based on Gracefully Degraded Data Aggregation (GDDA) to...

    Provided By Science Productions

  • White Papers // May 2013

    Research Proposal: An Intrusion Detection System Alert Reduction and Assessment Framework Based on Data Mining

    The Intrusion Detection System (IDS) generates huge amounts of alerts that are mostly false positives. The abundance of false positive alerts makes it difficult for the security analyst to identify successful attacks and to take remedial actions. Such alerts to have not been classified in accordance with their degree of...

    Provided By Science Productions

  • White Papers // Oct 2013

    Deteriorating Distributed Denial of Service Attack by Recovering Zombies Using Penalty Scheme

    Resource of victim impounded by DDoS attack leads the victim to series monetary loss apart from various other ill-effects. Already lot of solutions came up in technological aspects almost neglecting the economical aspects. Hence, there is not yet a proper method to make the zombies accountable to the economical loss...

    Provided By Science Productions