Two-Stage Nonnegative Sparse Representation for Large-Scale Face Recognition

IEEE DOTNET based on  NEURAL NETWORKS G2013 Abstract             To recognizes the face using artificial neural network with back propagation algorithm. The powerful side of this new tool is its ability to solve problems that are very hard to be solved by traditional computing methods. Description Artificial Neural Network Artificial neural network is a branch of artificial intelligence [...]

Network Service Authentication Timing Attacks

IEEE DOTNET based on  NEURAL NETWORKS G2013 Abstract Brute force and dictionary attacks on password-only remote login services are now widespread and ever increasing. Enabling convenient login for legitimate users while preventing such attacks is a difficult problem. Automated Turing Tests (ATTs) continue to be an effective, easy-to-deploy approach to identify automated malicious login attempts with reasonable cost [...]

State Estimation over Sensor Networks with Correlated Wireless Fading Channels

IEEE DOTNET based on SECURE TRANSMISSION G2013 Abstract Compared to the first generation of malicious software (malware) in late 1980s, modern attacks are more stealthy and enveloping. Malicious software typically resides stealthily on a user’s computer and interacts with the user’s computing resources. We define data provenance integrity as the security property stating that the source where a [...]

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks

IEEE DOTNET based on SECURE TRANSMISSION G2013 Abstract Distributed key management framework which has advantages in the revocation of malicious system maintenance, and the implementation of heterogeneous security policies. An efficient cooperative message authentication protocol is developed, by which cooperative verifiers are intelligently selected to significantly reduce the computation and communication overhead in the group signature based implementation. [...]

Evaluating Implementation Strategies for Location-Based Multicast Addressing

IEEE DOTNET based on SECURE TRANSMISSION G2013 Abstract In this work we analyze the average queue backlog for transmission of a single multicast flow consisting of M destination nodes in a wireless network. In the model we consider, the channel between every pair of nodes is an independent identically distributed packet erasure channel. We first develop a lower [...]

A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation

IEEE DOTNET based on DISTRIBUTED NETWORKING G2013 Abstract Due to the growing popularity of the Internet, data centers/network servers are anticipated to be the bottleneck in hosting network-based services, even though the network bandwidth continues to increase faster than the server capacity. It has been observed that network servers contribute to approximately 40 percent of the overall delay, [...]

Dynamic Personalized Recommendation on Sparse Data

IEEE DOTNET based on DISTRIBUTED NETWORKING G2013 Abstract Interactions spanning multiple organizations have become an important aspect in today’s collaboration landscape. Organizations create alliances to fulfill strategic objectives. The dynamic nature of collaborations increasingly demands for automated techniques and algorithms to support the creation of such alliances. Our approach bases on the recommendation of potential alliances by discovery [...]

Energy-Efficient Coordinated Scheduling Mechanism for Cellular Communication Systems with Multiple Component Carriers

IEEE DOTNET based on DISTRIBUTED NETWORKING G2013 Abstract   The idea of traffic monitoring for detection of network attacks is based on an acquired knowledge perspective current techniques detect either the well-known attacks on which they are programmed to alert, or those anomalous events that deviate from a known normal operation profile or behavior. If we have the [...]

Genetic Algorithm for Energy-Efficient QoS Multicast Routing

IEEE DOTNET based on DISTRIBUTED NETWORKING G2013 Abstract Multiple application networks are being combined into consolidated corporate utility networks.Bandwidth contention as critical transaction traffic is squeezed by web browsing, file transfers, or other low-priority or bulk traffic. In query-based systems, a user would issue a query and expect a response to be returned within the deadline. While the [...]

Latent Fingerprint Matching Using Descriptor-Based Hough Transform

IEEE DOTNET based on INFORMATION SECURITY G2013 Abstract The use of multiple biometric sources for human recognition, referred to as multibiometrics, mitigates some of the limitations of unimodal biometric systems by increasing recognition accuracy, improving population coverage, imparting fault-tolerance, and enhancing security . The number of multibiometric systems deployed on a national scale is increasing  and the sizes [...]