Kamran Khan
Fixed Point Theorems for Multivalued Mappings Satisfying Functional Inequality
The Influence of Pseudorandom Communication on Complexity Theory
Cyber Crime Effecting E-Commerce Technology
Feasibility and Importance of Wireless Intelligent Network (WIN)
Design and Analysis of New Software Conformance Testing: NA Mutation Testing
Hybrid Multi Resolution Method of Image Fusion for Medical Image Processing
Enhancing Data Security by Using Crypto-Steganography in Image
Introduction Security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and …
Read More »Software Evaluation for Developing Software Reliability and Metrics
A Comprehensive Study to Reduce Traffic Accidents Using Fuzzy Logic Approach
Consumer Awareness to Protect Internet Users – A Scenario
Speech Enhancement Using Neural Network
A Compression Method for PML Document Based on Internet of Things
Using TINI Point-to-Point Protocol (PPP)
Modeling for Prediction of Characteristic Deflection of Flexible Pavements- Comparison of Models Based on Artificial Neural Network and Multivariate Regression Analysis
Secure Watermarking Technique for Emerging Clouds
A Concept of File Deletion and Restoration as A Threat to Commit Cyber Crime
Introduction Cyber crime consist of any criminal act dealing with computers and networks called as hacking. Additionally, cyber crime also includes traditional crimes conducted through the Internet like telemarketing and Internet fraud, identity theft, and credit card account thefts, as these illegal activities are committed through the use of a computer and the Internet [1]. The first recorded cyber crime …
Read More »Wireless Sensor Network for Monitoring A Patient Having Hole in the Heart Continuously Using Zigbee
Introduction A small defect between the two upper chambers of the heart recently has been linked to stroke and appears to be linked migraine headaches. The defect is known as a patent foramen ovals(PFO), now can be detected and treated without surgery. The foramen ovals is an opening between the right and left atrium (atrial septum). This opening allows blood …
Read More »A Comprehensive Study of Technologies and Trends Used in Latest Mobile Computing Environment
Introduction In this paper we discuss about all the basic components of mobile devices which are being used in the development of mobile phones. In this topic we basically focused on which type of client server architecture we used in the mobile computing. We also discuss various types of operating systems which we use very frequently in the mobile devices …
Read More »A Hybrid Multi-Agent Routing Algorithm Based on Ant Colony Optimization for MANET
Introduction A mobile ad-hoc network (MANET) is a set of mobile nodes which communicate over radio and do not need any established infrastructure. This kind of network is very flexible and suitable for several situations and applications due to it need a temporary communication without preinstalledinfrastructure9. There are so many important fields where mobile ad hoc network play an important …
Read More »Framework for Threshold Based Centralized Load Balancing Policy for Heterogeneous Systems
Introduction Heterogeneous system network interconnects a multitude of diverse machines to perform computationally intensive applications that have diverse computational requirements. The heterogeneous system comprises of hardware and operating system software from variety of vendors. Zina Ben Miled et al, 1998 established that heterogeneous machine can have higher cost-efficiency than the optimal homogeneous machine. The performance of this kind of system …
Read More »Amalgam Version of Itinerant Augmented Reality
Introduction One of the strongest advantages of mobile and wearable computing systems is the ability to support location-aware or location-based computing, offering services and information that are relevant to the user’s current locale3. Location-aware computing systems need to sense or otherwise be told their current position, either absolute within some reference coordinate system or relative to landmarks known to the …
Read More »Energy Efficient Cluster Based Partial Multihop Algorithm for Hetrogeneous (CPMH) WSN
Introduction Current WSN has become hot in researching. Wireless sensor network collect data to base station by deploying sensor nodes that arrangement themselves in certain region. In WSN, sensor nodes with some initial energy deployed randomly. It is difficult to add energy while the node deployed, so saving energy is very important. Clustering is an important energy-saving method in WSN, …
Read More »Securing the Information Network
Construction of High Performance Stream Ciphers for Text Web Browsers Using Adders
Introduction The information stored is secured by several security measures. But information get the problem of susceptibility when one send it to some another computer on internet. As some unauthorized person like hacker can incept, conceal or stolen the fully or partial part of information. To come out of the problem, here sender makes the text ridiculous by using encryption …
Read More »Implementing Power Saving Strategies in Wireless Sensor Networks Using IEEE 802.16e
Introduction In mobile networking, the power consumption of an MS is an important index for measuring portable mobile devices performance because of mobility of MS, which is generally energized by battery, implies that Power-Saving ? Mechanism (PSM) becomes an issue in designing the Medium Access Control (MAC). To enhance the power efficiency of BWA devices based on battery energy, IEEE …
Read More »Advanced Algorithmic Approach for IP Lookup (Ipv6)
Introduction The internet is becoming ubiquitous and has been exponentially and continuously growing in size. The number of users, networks and domains connected to the internet seem to be exploding. The 32-bit addresses of the IPv4 format are not sufficient to address the rapidly increasing users and domains, and will soon be exhausted. Hence the 128-bit IPv6 address format that …
Read More »Basic Graphs Terminologies, Their Representation and Applications
Introduction The one of the applied branch of mathematics is Graph Theory. In the field of study there are a wide range of applications of graph theory the some of them are in operational research, genetics, physics, chemistry etc. Basically in the study of graph theory we can represent the relationship between various objects in very simple and convenient way …
Read More »CIODD : Cluster Identification and Outlier Detection in Distributed Data
Introduction Knowledge Discovery in Databases (KDD) is the process of searching large volumes of data for the non trivial extraction of implicit, novel, and potentially useful information. Traditional KDD applications require complete access to the data which is going to be analyzed. Nowadays, a huge amount of heterogeneous, complex data resides on different computers which are connected to each other …
Read More »Different Methods for Statistical Face Representation – Review
Introduction The developing of face recognition system is quite difficult because human faces is quite complex, multidimensional and corresponding on environment changes. For that reason the human machine recognition of human faces is a challenching problem due the changes in the face identity and variation between images of the same due to illumination, pose variations and some natural effects.The issues …
Read More »Detecting Faces According to their Pose
Introduction Face detection, defined as detection and localisation of human faces in images, has been challenging topic in human computer interaction (HCI) researches. Human face detection application is observable mainly in video surveillance, face recognition and image databases management. In general, single image detection methods can be classified in to four categories1 Knowledge-based methods. Feature invariant approaches. Template matching methods. …
Read More »User Interface Modeling
Introduction The goal of Ul is to minimize the possibility to overlook Ul requirements by developing them early on in the design process and by using them as a comparison with all developed components of the system model. In software development, designers use model that help in object-oriented development, understand, organize and represent the system’s architecture and functionally. UML provides …
Read More »Security Management System for Oilfield Based on Embedded Wireless Communications: A Design Approach
Introduction A security system is necessary for a building to guarantee the safety of the residents. The security system has gone through single-route monitor system, control loop monitor system, and processor plus multimedia monitor system eras in the past twenty years. With rapid development of national economic construction, there is a great demand and dependent on patriotic in various industries. …
Read More »Common Fixed Point Theorems for the Pair of Mappings in Hilbert Space
Introduction Most of fixed point theorems for mappings in metric spaces satisfying different contraction conditions may be extended to the abstract spaces, like Hilbert, Banach and locally convex spaces etc with some modifications. Some such interesting classes of contraction by Ciric1,Dotson2 proved fixed point theorems for non-expansive mappings on star shaped subsets of Banach spaces (i.e. || Tx-Ty|| ≤ ||x-y|| …
Read More »Analysis of Routing Attacks in Peer to Peer Overlay Networks
Introduction Overview of DHT and CHORD Distributed Hash Table DHT is capable to accomplish two of our main needs. DHT is the distributed data structures which hold key and value pairs in a fully distributed manner. It also puts each key-value pair on a single or limited node only. To decide on which node a specific pair has to be …
Read More »Application of Cloud Computing for the Better E-Governance in Developing Countries
Introduction (Rastogi 2010) Discusses the various problems that has been identified in implementing the various phases of the E-governance in developing countries. The Main problems that he had discussed are Infrastructure Development, Accessibility, Security, Trust & Privacy, Transparency, Permanent Availability and Preservation, Cost Structures. The following section discusses the Traditional architecture of the E-governance and the various problems in this …
Read More »Establishment of Evaluation Scheme of Model Driven Architecture
Introduction The evaluation scheme of model driven architecture should be considered as an all-round effort instead of concentrated. It must target the entire major and minor steps before having the layout of such scheme. The targeted evaluation scheme must be composed of three-layer architecture: Figure 1 Click here to View figure The above core architecture reflects the three major …
Read More »Detecting Terror- Related Activities on the Web Using Neural Network
Introduction The Internet is an efficient communication infrastructure that is increasingly used by terrorist organization to safely communicate with their affiliates, coordinate action plans, spread propaganda message, raise funds, and introduce supporters into their networks. Government and intelligence agencies are calling to invest major efforts in development of new method and technologies for identifying terrorist activities on the web in …
Read More »Boundary Value Analysis for Non-Numerical Variables: Strings
Introduction Testing is an expensive part of software develop process often consisting of approximately 50% of overall budget. It also fails to find many of the problems in software. Testing is thus a difficult and expensive process and the development of efficient, effective test technique is the major research paper. Developing effective and efficient techniques has been a major problem …
Read More »Rule Based Approach for English to Sanskrit Machine Translation and Synthesizer System
Introduction The module present concerns with the Machine Translation domain of Natural Language Processing. This area of Artificial Intelligence is very useful in providing people with a machine, which understands diverse languages spoken by common people. It presents the user of a computer system with an interface, with which he feels more comfortable. Since, there are many different languages spoken …
Read More »Multiple Classifiers System for Medical Diagnosis
Introduction Data mining is the nontrivial extraction of implicit, previously unknown, interesting and potentially useful information from data1. Data mining helps in decision making. Now a day’s hospitals and health care institutions are well equipped with monitoring and other data collection devices. Data is collected and shared with other hospital information systems. Due to the idiosyncracies of the medical profession, …
Read More »A Novel Approach to Construct Decision Tree Using Quick C4.5 Algorithm
Introduction Decision tree is probably the most widely used approach to represent classifiers. Originally it has been studied in the fields of decision theory and statistics. However, it was found to be effective in other disciplines such as data mining, machine learning, and pattern recognition. Decision tree is a classifier in the form of a tree structure (see Figure 2.4), …
Read More »Key Management With Cryptography
Introduction Growing number of business operations conducted via Internet or using a network environment for exchanging private messages requires increasing means for providing security and privacy of communication acts. Cryptography techniques are essential component of any secure communication.Two main cryptography systems are used today: symmetric systems called also systems with a secret key,and public-key systems. An extensive overview of currently …
Read More »Secure and Auditable Agent-Based Communication Protocol for E-Health System Framework
Introduction E-health system has been used as communication system that enables to deliver medical service over the Internet. Internet is an open access system that allows anyone to participate and access the data. The growth of Internet and information technology has made unproblematic electronic health service that offers a scheme for the doctors to keep the records of patients in …
Read More »IRIS Template Classification Using Selective Sub Bands of Wavelets
Introduction Textures are complex visual patterns composed of entities, or sub patterns that have characteristic brightness, color, slope, size. Thus texture can be regarded as a similarity grouping in an image (Rosenfeld 1982). The local sub-pattern properties give rise to the perceived lightness, uniformity, density, roughness, regularity, linearity, frequency, phase, directionality, coarseness, randomness, fineness, smoothness, granulation of the texture as …
Read More »A New Intelligent Predictive Caching Algorithm for Internet Web Servers
Introduction The enormous popularity of the World Wide Web has caused a tremendous increase in network traffic due to http requests. This has given rise to problems like user-perceived latency, Web server overload, and backbone link congestion. Web caching is one of the ways to alleviate these problems . Web caches can be deployed throughout the Internet, from browser caches, …
Read More »Some Notable Reliability Techniques for Disk File Systems
Introduction File system metadata includes directory organization, file size, block spanning information, resource allocation, etc. This metadata controls the structure of a file system and hence maintaining the integrity of metadata is the key of file system reliability. Depending upon the type of file system, metadata is located in several different places and hence file operations that require updating file …
Read More »Identifying Some Problems with Selection of Software Testing Techniques
Introduction Software testing is the process of executing a program with the intent of finding errors1 Or, it involves any activity aimed at evaluating an attribute or capability of a program or system and determining that it meets its required results2. Software testing is also used to test the software for other software quality factors like reliability, usability, integrity, security, …
Read More »Comparative Analysis on Speckle Noise Reduction Techniques on Computed Tomographic Images
Introduction Unlike many other imaging applications, where the quality of the de-noised image is estimated by how pleasant visual interceptions it gives to the human eye, medical applications require some constraints, for example the generation of artifact that could be misinterpreted as clinically interesting features. To achieve the best possible diagnoses it is important that medical images be sharp, clear, …
Read More »Logical Study of Passwords
Introduction No doubt information is a valuable asset in this digital age. Due to the critical nature of information, be it personal information on someone’s personal computer or information systems of large organizations, security is a major concern. There are three aspects of computer security: authentication, authorization and encryption. The first and most important of these layers is authentication and …
Read More »