The World

Displaying 1-40 of 403 results

  • White Papers // Dec 2014

    Analysis of Wavelet Families on Audio Steganography Using AES

    With the growing trends in wireless network in this modern era, more and more multimedia data are generated and transmitted. So the effective ways to ensure their security are increased. This can be achieved by implementing steganography techniques. Audio steganography is more challenging compared to image or video steganography. There...

    Provided By The World

  • White Papers // Dec 2014

    HEFT Based Cloud Auto-Scaling Algorithm with Budget Constraints

    Cloud computing now-a-days is playing major role in processing enterprise and personal applications. Its dynamic scalability enables users to scale up/down underlying infrastructure in response to dynamic performance behaviors. This benefit provides the basis for solving performance-resource mapping problem when deploying an application on cloud. Many researches on exploring efficient...

    Provided By The World

  • White Papers // Dec 2014

    Performance Analysis of Security Protocol for Advanced Metering Infrastructure in Smart Grid

    The smart grid is a network of computers and power infrastructures that monitor and manage energy usage. This paper aims to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security. A security protocol, Integrated Authentication...

    Provided By The World

  • White Papers // Dec 2014

    Survey on Minimizing Energy Consumption in Mobile Adhoc Networks

    Mobile ad hoc network consists of nodes that move arbitrarily. It leads to dynamic topologies. Power failure of a mobile node not only affects the node itself but also its ability to forward packet on behalf of others and the overall network life time. For this reason many research efforts...

    Provided By The World

  • White Papers // Dec 2014

    Analysis on Environmental Decision in Artificial Intelligence System for Multi Disciplinary Applications

    An effective protection of the people environment is largely dependent on the quality of the available information used to make an appropriate decision. Problems dissent when the quantities of forthcoming collection are huge and non homogenous which are future from some antithetical disciplines or sources and their propertied could not...

    Provided By The World

  • White Papers // Dec 2014

    A Survey of Routing Attacks and Detection Schemes in MANET

    The insecurity of the wireless links, power and energy constraints, poor physical protection of nodes in a hostile environment, and the vulnerability of statically configured security schemes poses challenges for routing and secure data transfer in wireless networks. No part or component of the network is dedicated to support specific...

    Provided By The World

  • White Papers // Nov 2014

    Optimal Contention Window Selection in IEEE 802.11 MAC Protocol for Better Performance of Wireless Networks

    In this paper, the authors investigate the impact of network size and contention window on the performance of the IEEE 802.11 MAC protocol. The performance of any network needs to be evaluated on certain criteria, these criteria then decide the basis of performance of any system. Study on wireless networks'...

    Provided By The World

  • White Papers // Nov 2014

    E-Mail Fusion with Graph Based Approach Stipulating OPass Security

    Most users are satiated with separately logging in into their multiple accounts, and hence end up spending a large amount of time in accessing them. It becomes a tedious task to remember all email id's and passwords for all their accounts. In this paper, the authors present a single framework...

    Provided By The World

  • White Papers // Nov 2014

    Quick Predictive Handover to Ensure Optimal QoS in Heterogeneous Mobile Network Platform

    Recently these day, mobile IPv6 based mobile networks are increasing with the widespread popularity of cutting edge wireless internet connectivity. As Internet users are moving away from fixed connections to mobile connections in dealing with their day-to-day activities. In order to remain connected to the Internet while on the go,...

    Provided By The World

  • White Papers // Oct 2014

    Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control

    In view of the invasive web traffic, this paper propose a distributed traffic management framework, in which routers area unit deployed with intelligent rate controllers to tackle the traffic mass. in contrast to different express control protocols that ought to estimate network parameters (e.g., link latency, bottleneck information measure, packet...

    Provided By The World

  • White Papers // Oct 2014

    Secure Sharing in Distributed Information Management Applications

    Interaction between entities that may not trust each other is now commonplace on the Internet. This paper focuses on the specific problem of sharing information between distrusting parties. Previous work in this area shows that privacy and utility can co-exist, but often do not provide strong assurances of one or...

    Provided By The World

  • White Papers // Oct 2014

    Facilitating Indirect Mutual Trust for Cloud Storage Systems

    In this digital age, organizations produce a large amount of sensitive data including personal information such as financial data. The local management of such humongous amount of data is problematic and costly due to the requirements of high storage capacity and experienced personnel. Storage-as-a-Service (SaaS) offered by Cloud Service Providers...

    Provided By The World

  • White Papers // Oct 2014

    Opportunistic MANETs: Quality Will Frame for Low Transmission Power

    Opportunistic Mobile Ad-hoc NETworks (MANETs) are a special category of thin and disconnected MANETs wherever knowledge communication exploits isolated contact opportunities among nodes. The authors tend to think about opportunist MANETs wherever nodes move independently haphazardly over a sq. of the plane. Nodes exchange data if they're at a distance...

    Provided By The World

  • White Papers // Oct 2014

    SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management System

    The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of that of a fully trusted key...

    Provided By The World

  • White Papers // Oct 2014

    Cloud Based Structure Approach of Content-as-a-Service for Supplier Impartial of Mobile Gadgets

    These days, mobile gadgets have turn into a commodity, people use several gadgets for various purposes. While people carry only some of their gadgets with them, people still want to access content originating from any device. To overcome this issue, content is often uploaded into a hosting service available in...

    Provided By The World

  • White Papers // Oct 2014

    Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    In this paper, the authors propose redundancy management of Heterogeneous Wireless Sensor Networks (HWSNs), to manage efficient communication in heterogeneous wireless sensor network by utilizing multipath routing to respond the user queries. This paper is to exploit the tradeoff between energy consumption vs. reliability, timeliness, and security to maximize the...

    Provided By The World

  • White Papers // Oct 2014

    Artificial Intelligence in Cyber Defense

    Day-by-day the technology is growing and in proportion to cyber crime is also growing and it becomes very difficult to track the application and to know the loopholes in the application. In order to have a mechanism build in such a way that the application will track all such changes...

    Provided By The World

  • White Papers // Oct 2014

    Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks

    A major challenge in securing wireless applications and services is the inherent vulnerability of radio transmissions to communication jamming Denial-of-Service (DoS) attacks. This vulnerability gains in significance the more one takes the ubiquity of these applications and services for granted and becomes a crucial factor in the context of safety-critical...

    Provided By The World

  • White Papers // Oct 2014

    Secure Mining of Affiliation Runs in Evenly Disseminated Databases

    The authors propose a convention for secure mining of affiliation runs in on a level plane appropriated databases. The current heading convention is that of Kantarcioglu and Clifton. Their convention, in the same way as theirs, is focused around the quick appropriated mining calculation of the researchers, which is an...

    Provided By The World

  • White Papers // Oct 2014

    Access Approach Union for Occasion Preparing Frameworks

    Privacy is a major concern in event processing system, Current event processing systems lack methods to maintain privacy methods on regular event streams in a chain of subsequently applied stream operations. The lack of privacy in event processing system will impact on large scale distributed applications such as logistics applications....

    Provided By The World

  • White Papers // Oct 2014

    Genetic Algorithm to the Development of Artificial Intelligence in Module System

    Artificial Intelligence (AI) is an extremely important role in new technological progress. It represents humanity's life time dream of elevating computers beyond the realm of simple machines for the calculation and processing of data. With the incorporation of artificial intelligence, computers are able to engage in behavior similar to human...

    Provided By The World

  • White Papers // Oct 2014

    A Hybrid Intrusion Detection System for Identification of Anonymous Behavior

    Various approaches available for identify the unauthorized behavior of the incoming nodes like with their trust measures like direct trust, indirect trust and reputation metric, these metrics always maintained globally so network cannot directly depend on it. Servers maintain firewall log data of in and out traffic for intrusion detection...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Data Monitoring Service Over Cloud

    Auditing over cloud data is an interesting research topic in cloud computing. Data owner uploads data fragments after the segmentation of data component to cloud server and auditor monitors data component which is uploaded by the data owner, traditional approach completely depends on third party auditor. In this paper, the...

    Provided By The World

  • White Papers // Oct 2014

    Privacy Preserving Data Storage of Intermediate Data Sets Over Cloud

    Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility over a network. Security should be provided when sharing of cloud data. In this paper, the authors are using ID3 for classification of intermediate data set to store data into cloud. Before...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Filtering Technique over Undesirable Data of OSN User Walls

    Prevention of unwanted and unauthorized data over Internet has become popular mechanism in online social networks. Authorization and control given to the users to prevent those spams either messages or images. In this paper, the authors are proposing an efficient spam filtering mechanism with Naive Bayesian classification by forwarding the...

    Provided By The World

  • White Papers // Oct 2014

    A Secure Self-Destructive Active Storage Framework for Data Confidentiality

    One of the most important services provided by cloud is backend support or data storage area. Obviously it leads to data confidentiality issues while the authors are storing data in remote locations. Self-destructing system gains most importance in recent days of technology. Entire data and its duplicates will become disturbed...

    Provided By The World

  • White Papers // Oct 2014

    A Framework for Attaining Uncertainty and Traceability in WMN

    Anomaly detection is one of the interesting research issues in network security. Identification of anonymous behavior is a complex task to analyze. Anonymity achieves security for users to attack free network services. The situations related to anonymity have been strongly studied in payment based systems such as online cash payment...

    Provided By The World

  • White Papers // Oct 2014

    MIMO-OFDM Downlink Wireless System with Reduced PAPR

    Orthogonal Frequency Division Multiplexing (OFDM) is a multi -carrier transmission method which is most broadly used in the field of communication. One of the main drawbacks of this scheme is Peak to Average Power Ratio (PAPR). There are various methods introduce for the reduction of PAPR in OFDM. However these...

    Provided By The World

  • White Papers // Oct 2014

    Secure Communication Using Modified S-DES with Steganography

    As the communication has developed the need for providing security to the information has become an important issue. Three information hiding techniques that are interlinked are steganography, watermarking and cryptography. In this paper, a novel steganographic method is proposed that is based on the LSB. Here, not only the message...

    Provided By The World

  • White Papers // Oct 2014

    Mobile Sensor and Destination Tracking in Wireless Sensor Networks

    In this paper, the authors study the matter of pursuit signal-emitting mobile targets victimization navigated mobile sensors supported signal reception. Since the mobile target's maneuver is unknown, the mobile device controller utilizes the activity collected by a wireless device network in terms of the mobile target signal's Time Of Arrival...

    Provided By The World

  • White Papers // Oct 2014

    A Novel Classification Approach for Firewall Log Data Analysis

    Firewall log data analysis always an interesting research issue in the field of internet traffic analysis, Even though various approaches available for minimizing internet traffic over heads during network traffic, may not be optimal for all possible samples. In this paper, the authors are proposing an efficient classification approach for...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Secure Data Sharing Between Multi Data Owners

    Cloud computing is one of the interesting research issue now-a-days of recent technology, due to its services, features, low-maintenance and high quality on demand service to cloud users. Multiple data owners can share the data component securely with authentication. In this paper, the authors are proposed the concept digital certificate...

    Provided By The World

  • White Papers // Oct 2014

    Power Saving and Reducing Transmission Delay in WSN Using DMP Scheme

    Scheduling the different types of packets, such as real time and non-real time data packets at sensor nodes in WSN is very important in reducing end-to-end data transmission delay. There are several schemes such as FCFS, DMP Scheme. But these have high processing overhead and long end-to-end data transmission delay....

    Provided By The World

  • White Papers // Oct 2014

    GNU Radio Based BIST for SDR Performance Measurement

    In this paper, the authors investigate on methods to develop Built-In Self-Test (BIST) method for performance measurement of a wideband (20MHz) Software Defined Radio (SDR) with frequency coverage from 50MHz to 2.4GHz. The overall quality of transmission and reception is dictated by various RF system and baseband specifications in wireless...

    Provided By The World

  • White Papers // Oct 2014

    Importance of Load Balancing in Cloud Computing Environment: A Review

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and web services. A cloud consists of several elements such as clients, datacenter and distributed servers. It includes fault tolerance, high availability, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services etc. Central to...

    Provided By The World

  • White Papers // Oct 2014

    128-Bit Advanced Encryption Standard Algorithm Implementation on FPGA

    In any communication, data security plays a vital role and there is a need to protect data from malicious attacks. This paper presents 128 bit pipelining processing of Advanced Encryption Standard (AES). This implementation is compared with previous paper iterative looping to show better efficiency. Encryption and decryption was carried...

    Provided By The World

  • White Papers // Oct 2014

    Security Based Intrusion-Detection System for Ad Hoc Mobile Wireless Networks

    The migration to wireless network from wired network has been a worldwide trend within the past few decades. The quality and quantifiability brought by wireless network created it attainable in many applications. Among all the modern wireless networks, Mobile Ad hoc NETwork (MANET) is one among the foremost important and...

    Provided By The World

  • White Papers // Oct 2014

    Supervision Termination for Multipath Routing with Intervention Detection in Wireless Sensor Networks

    Research problems are to enhance an Intrusion Detection System (IDS) of a clustered HWSN to prolong its lifetime operation in the presence of unreliable and malicious nodes. Also, to address the energy consumption and QoS gain in reliability, delay and security with the goal to maximize the lifetime of a...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks

    Technology has its own way to put forward the next level of research. In the era of Fine dine of IT revolution, where the authors use the Socket layer and its encryption mechanism is a hot cake in the IT Industry, having a good competition to provide the best of...

    Provided By The World

  • White Papers // Oct 2014

    Defending Against Flood Attacks in Distraction Unbiased Networks

    Distraction Unbiased Networks (DUNs) utilize the portability of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DUNs are unprotected to flood attacks in which attackers send as many packets or packet replicas as possible...

    Provided By The World

  • White Papers // Oct 2012

    E-Education Using Cloud Computing

    With the rapid development of modern knowledge society, there is an increasing demand of E-Education, that stress students' interaction when the availability of educational information and content is growing exponentially. National long-term plan of educational development and reform has point out that information technology has revolutionary impact on educational development....

    Provided By The World

  • White Papers // Dec 2012

    Energy-Efficient Position Based Routing Protocol for Mobile Ad Hoc Networks

    A mobile ad-hoc network is an infrastructure less temporary network without any centralized administration. In such network, all nodes are mobile and can be connected dynamically in an arbitrary manner. In mobile ad-hoc networks, limited power supply is a challenge. So energy efficient mechanisms should be combined with existing routing...

    Provided By The World

  • White Papers // Dec 2012

    Multi-Tiered Architecture for Intrusion Prevention

    Today with the Internet available as a general tool, access to any publicly reachable network is a way for the legit users to leverage network resources. On the other hand, it is a way for hackers and attackers to exploit a network whether it is for competitive, financial, revenge or...

    Provided By The World

  • White Papers // Oct 2012

    Efficient DNS Based Load Balancing for Bursty Web Application Traffic

    This research proposes a new efficient load balancing algorithm which applies to the local Domain Name Service (DNS) server for web based applications and services to ease the sudden increase in demand for the services. Owing to the existing load balancing algorithms still experience server's resource congestion and slow connection...

    Provided By The World

  • White Papers // Dec 2012

    An Energy Efficient Medium Access Protocol for Wireless Sensor Networks

    Wireless sensor networks have been widely used in many important fields such as target detection and tracking, environmental monitoring, industrial process monitoring etc. Since the nodes in wireless sensor networks consist of a limited power source, energy efficient operations of the nodes are very important. Although energy conservation in communication...

    Provided By The World

  • White Papers // Feb 2013

    FEM Analysis, Design and Optimization of a Compact Bandpass Filter for Low-Power UWB Communications Applications

    With the aid of the Finite Element Method (FEM) and a commercial EM simulator, the analysis, the design and the optimization of a compact band-pass filter using inter-digital coupled microstrip lines with performance suitable for low-power UWB communications applications, are presented. The design of the compact UWB band-pass filter is...

    Provided By The World

  • White Papers // Apr 2013

    A Simple and Original Design of Multi-Band Microstrip Patch Antenna for Wireless Communication

    Simulated design and analysis of a new simple multi-band microstrip antenna is presented in this paper. An introduced design covers the requisite bandwidth for GSM/DCS/PCS/UMTS cellular phone system and IEEE Wireless Local Area Network (WLAN) standards: 802.11n, b/g (Wi-Fi), Bluetooth. Light weight, low-cost, plain configuration and multi-band functionality are the...

    Provided By The World

  • White Papers // Apr 2013

    A Review on Dynamic MANET on Demand Routing Protocol in MANETs

    Mobile ad-hoc network is one of the types of wireless ad-hoc networks which has distinguished characteristics like: self configuring, decentralized and infrastructure less. Mobile nodes in such a network communicate with each other through wireless links since the nodes are always on move, routing in such a set up is...

    Provided By The World

  • White Papers // Apr 2013

    Performance Improved Graph Based Scheduling Algorithm for Infrastructure Based Cognitive Radio Networks

    This paper focuses on Cognitive Radio Network (CRN), in which a group of nodes communicate over a shared wireless medium with a limited bandwidth. Here frequency channel for transmission of Primary Radio Network (PRN) which is the legacy network will be shared to the Secondary Users (SU). Whenever resources are...

    Provided By The World

  • White Papers // Apr 2013

    Slot Loaded Microstrip Antenna for GPS, Wi-Fi, and WiMAX Applications Survey

    A tri-band slot loaded microstrip antenna is proposed. The tri-band characteristics of antenna are achieved by incorporating a combination of symmetrical Y-shaped and asymmetrical U-shaped slot. The Y-shaped slot is placed symmetrically where as U-shaped slot is placed asymmetrically to the center of the patch to achieve the desired tri-band...

    Provided By The World

  • White Papers // Apr 2013

    Design of Dual Band Dielectric Resonator Antenna With Serpentine Slot for WBAN Applications

    To achieve dual frequency operation for Wireless Body Area Network (WBAN) applications, a hybrid dual-band dielectric resonator antenna with serpentine slot fed by a microstrip line is proposed. The proposed antenna structure consists of cylindrical dielectric resonator and serpentine slot resonator. The serpentine slot is etched on the ground plane...

    Provided By The World

  • White Papers // Aug 2012

    Channel Capacity of MIMO System Over NAKAGAMI- M Fading Channel

    Multiple Input and Multiple Output (MIMO) system have the potential to achieve very high capacities, depending on the propagation environment. A MIMO system provides multiple independent transmission channels, thus, leading (under certain conditions) to a channel capacity that increases linearly with the number of antenna elements. It is well known...

    Provided By The World

  • White Papers // Aug 2012

    Analysis and Implementation of FP & Q-FP Tree with Minimum CPU Utilization in Association Rule Mining

    Association rule mining, one of the most important and well researched techniques of data mining, was first introduced in. It aims to extract interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. However, no method has been shown to...

    Provided By The World

  • White Papers // Aug 2012

    Energy Efficient Geographical Routing Protocol with Location Awareness in Mobile AdHoc Network

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the...

    Provided By The World

  • White Papers // Oct 2012

    Analysis on AES Algorithm Using Symmetric Cryptography

    In this paper, the authors present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in...

    Provided By The World

  • White Papers // Oct 2012

    Analysis of Wormhole Attack in AODV Based MANET Using OPNET Simulator

    Mobile Ad hoc NETwork (MANET) is a self-configuring network formed with wireless links by a collection of mobile nodes without using any fixed infrastructure or centralized management. The mobile nodes allow communication among the nodes by hop to hop basis and the forward packets to each other. Due to dynamic...

    Provided By The World

  • White Papers // Jan 2013

    Compact Band Width Enhanced Microstrip Antenna for WLAN Applications

    The microstrip patch antennas are widely used in modern communication system due to low profile, low weight, low cost However, the antennas suffered from narrow bandwidth and low gain. Therefore, various techniques have been proposed in the literature to increase the bandwidth. These include cutting slots in the metallic patch...

    Provided By The World

  • White Papers // Sep 2012

    Hybrid Biometric Recognition Based Secured Database Retrieval

    In this paper image retrieval technique based on features extraction using Kekre transform is presented. This transform is applied on combination of row mean and column mean. Today, Biometric recognition is a common & reliable way to authenticate the identity of a person based on the physiological or behavioral characteristics....

    Provided By The World

  • White Papers // Sep 2012

    Secure DSR Protocol in MANET Using Energy Efficient Intrusion Detection System

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a Link Layer ad hoc network. In an attempt to enhance security in MANETs...

    Provided By The World

  • White Papers // Sep 2012

    Enhanced IB- LEACH for Heterogeneous Wireless Sensor Networks

    Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Purpose is to conserve the transmitted energy from various sensor nodes. Various energy efficient algorithms have been designed for this. LEACH uses distributed cluster formation...

    Provided By The World

  • White Papers // Sep 2012

    Architecture for the Adaptation of Learning Paths Based on Ontologies and Bayesian Networks

    Several researches in the field of education have shown that taking into account learning styles has drastically improved the quality of teaching/learning. The adaptation of the course into the profiles and preferences of learners requires the collection of more information on learners, learning styles and educational resources. To identify the...

    Provided By The World

  • White Papers // Sep 2012

    Energy Optimization Approaches in Wireless Sensor Networks: A Survey

    Due to its importance like a restriction which affect the survivability and lifetime of devices in wireless communication, the energy consumption attract the attention of researchers around the world. Because of this, several approaches focuses their studies to the challenge of energy consumption. In Fact, related to their axes of...

    Provided By The World

  • White Papers // Nov 2012

    New Routing Algorithm Based on ACO Approach for Lifetime Optimization in Wireless Sensor Networks

    Recently, wireless sensor networks have become an active research topic. Developing solution for the routing problem in this kind of network is one of the main topics considered by researchers in order to maximize the network life time. In this paper, the authors present a novel routing approach using an...

    Provided By The World

  • White Papers // Sep 2012

    Modeling of e-Learning Based on Ant Colony Algorithm

    E-learning and distance education via the Internet is a means of current and promising teaching. However, it suffers from defects mainly related to the relative absence of the teacher and, therefore, the difficulty of adapting teaching to the level and behavior of the learner. This paper describes an approach of...

    Provided By The World

  • White Papers // Sep 2012

    Bayesian Bootstrap Filter Approach for GPS/INS Integration

    Inertial Navigation System (INS) and Global Positioning System (GPS) technologies have been widely used in a variety of positioning and navigation applications. Because the GPS and the INS complement each other, it is common practice to integrate the two systems. The advantages of GPS/INS integration is that the integrated solution...

    Provided By The World

  • White Papers // Sep 2013

    Improvising Forward Stream Integrity for Secure Logging in the Cloud

    The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or some) log entries is very important to any application using secure logging techniques. During this paper, the authors start by examining progressive in secure logging...

    Provided By The World

  • White Papers // Aug 2013

    Optimal Authentication Scheme for Mobile Communication System

    To meet the security specifications many of existing user authentication schemes requires huge computational cost. This Huge computational cost is because many of the authentication methods used exponential operations. But this approach is not suitable for mobile devices. In this paper, the authors propose a low computation cost user authentication...

    Provided By The World

  • White Papers // Oct 2013

    A Comparative Study of the Communication Architectures for Wireless Sensor Networks

    Wireless networks have evolved within a short span of time. A set of sensor nodes forming a cooperative network is known as Wireless Sensor Network (WSN). The future is going to be a global network connected through wireless sensors which respond to queries and events registered. In this work, an...

    Provided By The World

  • White Papers // Sep 2013

    An Effective Combination Technique for Artificial Intelligence Based Ensembles for Intrusion Detection

    Artificial intelligence based techniques capitulate better performance in identifying the intrusions than other conventional approaches used in this field, but no single classifier is capable of identifying intrusions with acceptable accuracy. So, there is a necessity of integrating more than one classifier. This paper mainly focuses on constructing an ensemble...

    Provided By The World

  • White Papers // Sep 2013

    Bloom Vector Join for Sensor Query Processing

    Sensors are low-cost devices which sense and disseminate information about the environment around them. A set of such nodes which can communicate by radio transmission form a sensor network, which communicates with the outside world through a sink node. In view of their low cost and ad-hoc nature of deployment,...

    Provided By The World

  • White Papers // Oct 2013

    The P Vs NP Problem: A Method for Solving NP-Complete Problems by Use of Graph Embodiment on a Quantum Computation Paradigm Using a Relational Database Query

    The relationship between the complexity class P and NP is one of the most fascinating and unresolved question in theoretical computer science. The classical computational paradigm, hedged on Turing paper may be by itself the limiting factor. To investigate this relationship, a method for solving a query problem on a...

    Provided By The World

  • White Papers // Oct 2013

    A Novel and Cyclic Approach to Solve a Classification Problem

    In this paper, the authors propose a novel solution to solve the classification problems in the area of data mining. They are more concentrated on classification problem because the current test data set will become as training data set after a period of time, hence classification model must face the...

    Provided By The World

  • White Papers // Nov 2013

    Multimodal Biometrics Based System for Efficient Human Recognition

    In this paper, the authors propose the multimodal biometrics system for identity verification using four traits i.e., face, fingerprint, iris and signature. The proposed system is designed for applications where the training database contains a face, iris, two fingerprint images and/or one or two signature image(s) for each individual. The...

    Provided By The World

  • White Papers // Nov 2013

    Creating Minimized Data Sets by Using Horizontal Aggregations in SQL for Data Mining Analysis

    Mining historical data can help in discovering actionable knowledge. However, mining activities cannot be done directly on the regular databases. In order to perform data mining, it is required to prepare datasets that will be useful for mining process. Preparing datasets manually for data mining is a challenging task as...

    Provided By The World

  • White Papers // Nov 2013

    Analysis of Association Mining Through Enhanced Apriori Algorithm

    To select interesting rules from the set of all possible rules, constraints on various measures of significance and interest can be used. The best-known constraints are minimum thresholds on support and confidence. Association rule mining is an important field of knowledge discovery in database. Association Rule mining discovers uncover relationships...

    Provided By The World

  • White Papers // Nov 2013

    A Universal Session Based Bit Level Block Encoding Technique to Enhance the Information Security

    In this paper, a session based symmetric key cryptographic technique has been proposed and it is termed as Matrix Based Block Encoding Technique (MBBET). MBBET consider the input plain text as a stream of finite number of binary bits. This binary bit stream is chopped into manageable-sized blocks. The bits...

    Provided By The World

  • White Papers // Nov 2013

    TEFS, Trust and Cloud Computing

    Cloud computing is an emerging topic amongst IT personnel. Pay-as-you-go is the basis of cloud computing. It makes data services to be available in enormous speed and with greater ease but the data reside outside the organization's boundaries. Trusting the cloud provider is inevitable. Building Trust is the need of...

    Provided By The World

  • White Papers // Nov 2013

    Enhancing Seekable Sequential Key Generators along with FSS Scheme for Secure Logging in the Cloud

    The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or some) log entries is very important to any application using secure logging techniques. During this paper, the authors start by examining progressive in secure logging...

    Provided By The World

  • White Papers // Nov 2013

    A Novel Approach To Sogi Grid Synchronization System For Three-Phase Grid-Connected Power Converters Under Unstable Conditions

    The high penetration of renewable energy sources such as wind power and photo voltaics experienced in the last decades is a good example, as both generation systems are connected to the grid by means of power electronics-based power processors that should not only control the power delivered to the network,...

    Provided By The World

  • White Papers // Nov 2013

    Web Service Classification Using Efficient Neural Networks

    Classification is a widely used mechanism for facilitating web service discovery. Existing methods for automatic web service classification only consider the case where the category set is small. When the category set is big, the conventional classification methods usually require a large sample collection, which is hardly available in real...

    Provided By The World