Volume-7 ~ Issue-3
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | A Novel Design for a Palm Prints Enabled Biometric System |
| Country | : | India |
| Authors | : | Sulabh Kumra. Tanmay Rao |
| : | 10.9790/0661-0730108 ![]() |
|
Keywords: Palm prints, fusion, palmprint, hand geometry.
[1] W.K. Kong and D. Zhang, "Palm print texture analysis based on low-resolution images for personal authentication", in Proceedings of 16th International Conference on Pattern Recognition, vol. 3, pp. 807-810, 2002.
[2] A. Kong, D. Zhang and G. Lu, "A study of identical twins palm print for personal verification", Pattern Recognition, vol. 39, no. 11, pp. 2149-2156, 2006.
[3] [A.W.K. Kong and D. Zhang, "Competitive Coding scheme for palmprint verification", in Proceedings of International Conference on Pattern Recognition, vol. 1, pp. 520-523, 2004.
[4] A. Kong and D. Zhang, "Palm print identification using feature-level fusion", Pattern Recognition, vol. 39, no. 3, pp. 478-487, 2006.
[5] A. Kong, D Zhang and M. Kamel, "A study of brute-force break-ins of a palmprint verification system", IEEE Transactions on Systems, Man and Cybernetics, Part B, vol. 36, no. 5, pp. 1201-1205, 2006.
[6] Kong, K.H. Cheung, D. Zhang, M. Kamel and J. You, "An analysis of Biohashing and its variants", Pattern Recognition, vol. 39, no. 7, pp. 1359-1368, 2006.
[7] D. Zhang, W.K. Kong, J. You and M. Wong, "On- line palm print identification", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 1041- 1050, 2003.
[8] T. Connie, A.T.B. Jin, M.G.K. Ong and D.N.C. Ling, "An automated palmprint recognition system", Image and Vision Computing, vol. 23, no. 5, pp. 501-515, 2005.
[9] C.C. Han, "A hand-based personal authentication using a coarse-to-fine strategy", Image and Vision Computing, vol. 22, no. 11, pp. 909-918, 2004.
[10] C.C. Han, H.L. Cheng, C.L. Lin and K.C. Fan, "Personal authentication using palm-print features", Pattern Recognition, vol. 36, no. 2, pp. 371-381, 2003.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Active Source routing protocol in Mobile Network |
| Country | : | India |
| Authors | : | Anamika Bhushan, Divya Gupta, Anil Kumar |
| : | 10.9790/0661-0730914 ![]() |
|
Keywords: Secure Message Transmission, Multi-path Routing, Secure Routing, Secure Routing Protocol , Fault tolerance, mobile ad hoc network (MANET) security, network security, secure data transmission.
[1] P. Papadimitratos and Z.J. Haas, ―Secure Routing for Mobile Ad Hoc Networks,‖ in Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, Jan. 27-31, 2002.
[2] P. Papadimitratos, Z.J. Haas, and P. Samar, ―The Secure Routing Protocol (SRP) for Ad Hoc Networks,‖ Internet Draft, draft-papadimitratos-secure-routing-protocol-00.txt, Dec. 2002.
[3] M.O. Rabin, ―Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance,‖ Journal of ACM, Vol. 36, No. 2, pp. 335-348, Apr. 1989.
[4] H. Krawczyk, M. Bellare, and R. Canetti, ―HMAC: Keyed- Hashing for Message Authentication,‖ RFC 2104, Feb. 1997.
[5] P. Papadimitratos and Z.J. Haas, ―Secure Link State Routing for Mobile Ad Hoc Networks,‖ in Proceedings of the IEEE CS Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL, Jan. 2003.
[6] A. Tsirigos and Z.J. Haas, ―Multipath Routing in the Presence of Frequent Topological Changes,‖ IEEE Comm. Magazine, pp. 132-138, Nov. 2001.
[7] J. Broch, D.A. Maltz, D.B. Johnson, Y-C. Hu, J. Jetcheva, ―A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,‖ in proceedings of the 4th International Conference on Mobile Computing (Mobicom'98), 1998.
[8] ―Secure on-demand distance-vector routing in ad hoc networks,‖ in Proc. 2005 IEEE Sarnoff Symp., Princeton, NJ, Apr. 2005, pp. 168–171.
[9] S. Kent and R. Atkinson, ―Security architecture for the Internet protocol,‖ IETF, RFC 2401, Nov. 1998. [10] ―IP authentication header,‖ IETF, RFC 2402, Nov. 1998..
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Where to use agile methodology in Software development and its different models |
| Country | : | India |
| Authors | : | Shamsher Alam |
| : | 10.9790/0661-0732023 ![]() |
|
Keywords: XP- Xtreme Programming. CRC – Class-responsibility collaboration
[1] Advanced Development Methods, Inc. "Origins of Scrum"
[2] The agile Alliance Home Page, http://www.agilealliance.org/home
[3] Cockburn, A., and Agile Software Devlopment, Addision-Wesley 2002.
[4] Software Engineering – Roger S . Pressman
