Microsoft (MS) Hyper-V is a native hypervisor that enables platform virtualization on x86-64 systems. It is a microkernelized hypervisor where a host operating system provides the drivers for the hardware. This approach leverages MS Hyper-V to support enlightenments (the Microsoft name for Paravirtualization) in addition to the hardware emulation virtualization technique. This paper prov...
Paper Information
Authors Hasan Fayyad-Kazan, Luc Perneel, Martin Timmerman
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 28

The video coding standards are developed to satisfy the requirements of different applications for various purposes, higher coding efficiency, better picture quality, and more error robustness. The new international video coding standard H.264/AVC aims at having significant improvements in coding efficiency, and error robustness in comparison with the previous standards. Most of the vide...
Paper Information
Authors Dinesh Goyal, Srawan Nath, Dr. Naveen Hemrajani
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 26

In cloud environment the role based access control (RBAC) system model has come up with certain promising facilities for security communities. This system has established itself as highly robust, powerful and generalized framework for providing access control for security management. There are numerous practical applications and circumstances where the users might be prohibited to consid...
Paper Information
Authors Levina T, Dr. S C Lingareddy
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 19

Networks are being used in various areas and the demand of user’s nowadays has motivate the emergence of the mobile adhoc network (MANET). In this age of network, most challenging task is to deliver the packet successfully with dynamic network, delay, node and links fails restraint. And to fulfill the above required task, protocol should be used effectively and efficient...
Paper Information
Authors Mr. Brijesh Soni, Dr. Bhupesh Gour, Mr. Arjun Rajput, Dr. Asifullah Khan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

This paper reveals basics of Digital (Image) Forensics. The paper describes the ways to manipulate image, namely, copy-move forgery (copy region in image & paste into another region in same image), image splicing (copy region in image & paste into another image) and image retouching. The paper mainly focuses on copy move forgery detection methods that are classified mainly into two broad...
Paper Information
Authors Kalpana Manudhane, Mr. M.M. Bartere
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 16

In this paper, we present an enhanced approach for fingerprint segmentation based on Canny edge detection technique and Principal Component Analysis (PCA). The performance of the algorithm has been evaluated interms of decision error trade-off curve so fan over all verification system. Experimental results demonstrate the robustness of the system. ...
Paper Information
Authors N.Subbarao, S.M.Riyazoddin, M.Janga Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

This paper is about the different algorithms which are used for face recognition. There are so many algorithms which are available for face recognition .There are two approaches by which the face can be recognize i.e. face Geometry based and face appearance based. The appearance based technique is also sub divided into two technique i.e. local feature and global feature based. The techni...
Paper Information
Authors Hemant Makwana, Taranpreet Singh
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 20

Th ispaper describes the concept of automatic segmentation of continuous speech signal. Thelanguage used forsegmentation is the most widely spoken language i.e. Punjabi. Like all other Indianlanguages, Punjabi is a syllabic language, thus syllables are selected as the basic unit of segmentation. Thetraditional way of representing the speech signal is in termsof features derived from shor...
Paper Information
Authors Anupriya Sharma, Amanpreet Kaur
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10

Mobile agents have special characteristics which can help intrusion detection in several ways. The use of mobile codes and mobile agent based computing paradigms has been proposed in several researches till date. In this paper we try to present a scope for the possible association of Mobile Agents in the field of network security and management. ...
Paper Information
Authors S. V. Patil,Dr. S. D. Khamitkar,S. N. Lokhande
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 21

In this paper, an improved energy efficient PEGASIS based protocol (PEGASIS-E) has been proposed. PEGASIS-E uses average distance among the sensor nodes as the criteria for chaining, thereby providing better performance in terms of energy dissipation and amount of information sent to BS. The simulation results obtained show that PEGASIS-E gives an increase in the network lifetime as comp...
Paper Information
Authors Vibha Nehra, Ajay K. Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 31