Academy & Industry Research Collaboration Center

Displaying 1-40 of 1386 results

  • White Papers // Oct 2014

    Solving Scheduling Problems as the Puzzle Games Using Constraint Programming

    Constraint Programming (CP) is one of the most effective techniques for solving practical operational problems. The outstanding feature of the method is a set of constraints affecting a solution of a problem can be imposed without a need to explicitly defining a linear relation among variables, i.e. an equation. Nevertheless,...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2014

    Performance of Spatial Multiplexing, Diversity and Combined Technique for MIMO-OFDM System

    In this paper, Space Time Block Code (STBC), Spatial Multiplexing (SM) and hybrid model with OFDM are designed for Rayleigh fading channel. Combination of SM and STBC forms hybrid MIMO model. The performances of the above mentioned models with different modulations such as Quadrature Phase Shift Keying (QPSK) and Quadrature...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2014

    Effective Load Balancing Method in Ad Hoc Network Using PSO

    A Mobile Ad-hoc NETwork (MANET) is a self structured infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Load balancing is a technique to share out workload...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2014

    Performance Evaluation With a Comparative Analysis of Mimo Channel on the Basis of Doppler Shift and Other Probabilistic Parameters in Fading Environment

    At this present scenario, the demand of the system capacity is very high in wireless network. MIMO technology is used from the last decade to provide this requirement for wireless network antenna technology. MIMO channels are mostly used for advanced antenna array technology. But it is most important to control...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2014

    Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model

    Mobile devices, specifically Smartphone's, have become ubiquitous. For this reason, businesses are starting to develop \"Bring Your Own Device\" (BYOD) policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced mobile costs and IT efficiencies. However, due...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Factors Influencing Quality of Mobile Apps: Role of Mobile App Development Life Cycle

    In this paper, the mobile application field has been receiving astronomical attention from the past few years due to the growing number of mobile app downloads and withal due to the revenues being engendered. With the surge in the number of apps, the number of lamentable apps/failing apps has withal...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    An Extreme Programming Method for Innovative Software Based on Systems Design and Its Practical Study

    In software development, the waterfall model is commonly used, especially for large-scale software systems. For smaller-scale software development, agile software development approaches such as extreme programming or scrum are used. Traditional software development methodologies are mainly targeted toward customer-centric development, and therefore, new software methodologies are often not well received...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Automatic Tempest Test and Analysis System Design

    Today, it is clearly known that the electronic devices generate electromagnetic radiations unintentionally, which may contain critical information called Compromising Emanations (CE). CE is also known as TEMPEST radiation, which is a code name firstly used by an U.S government program. Every developed country has a Tempest Test Laboratory (TTL)...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Survey on Information Sharing Techniquesusing QR Barcode

    Now-a-days, the information processing system plays crucial part in the internet. Online information security has become the top priority in all sectors. Failing to provide online information security may cause loss of critical information or someone may use or distribute such information for malicious purpose. Recently QR barcodes have been...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Testing the Performance of the Power Law Process Model Considering the Use of Regression Estimation Approach

    The Power Law Process (PLP) model is a popular infinite NHPP model used to describe the reliability of repairable systems based on the analysis of observed failure data, this model was derived from the hardware reliability area. Within the class of Non-Homogeneous Poisson Process (NHPP) models and as a result...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    A Metrics Suite for Variable Categorization to Support Program Invariants

    Invariants are generally implicit. Explicitly stating program invariants, help programmers to identify program properties that must be preserved while modifying the code. Existing dynamic techniques detect invariants which includes both relevant and irrelevant/unused variables and thereby relevant and irrelevant invariants involved in the program. Due to the presence of irrelevant...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Metamodels Evaluation of Web Engineering Methodologies to Develop Web Applications

    The purpose of a metamodel in web engineering methodologies is for the platform independent analysis as well as the design of the content, navigation, and presentation issues of web applications. In the previous years, numbers of methodologies for the development of web applications were proposed, and most of them defined...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Forecasting the Wimax Traffic Via Modified Artificial Neural Network Models

    In this paper, the authors attempt to present a new approach of forecasting the WiMAX traffic by exploiting Artificial Neural Networks (ANNs). To develop the model, actual data is gathered from the LibyaMax network that spans the duration of 180 days in total. Traffic data is separated into three cases...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    A New Top-K Conditional XML Preference Queries

    Preference querying technology is a very important issue in a variety of applications ranging from ecommerce to personalized search engines. Most of recent research papers have been dedicated to this topic in the artificial intelligence and database fields. Several formalisms allowing preference reasoning and specification have been proposed in the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Automatic Training Data Synthesis for Handwriting Recognition Using the Structural Crossing-Over Technique

    In this paper, the authors present a novel technique called \"Structural crossing-over\" to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangent-based affine transformation. A couple of...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Face Recognition Algorithm Based on Orientation Histogram of Hough Peaks

    In this paper, the authors propose a novel face recognition algorithm based on orientation histogram of hough transform peaks. The novelty of the approach lies in utilizing hough transform peaks for determining the orientation angles and computing the histogram from it. For extraction of feature vectors first the images are...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    An Improved Multimodal PSO Method Based on Electrostatic Interaction Using Nnearest-Neighbor Local Search

    In this paper, an improved Multi-Modal Optimization (MMO) algorithm, called LSEPSO, has been proposed. LSEPSO combined Electrostatic Particle Swarm Optimization (EPSO) algorithm and a local search method and then made some modification on them. It has been shown to improve global and local optima finding ability of the algorithm. This...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Equivalent Condition and Two Algorithms for Hamiltonian Graphs

    The authors consider finite and simple graphs in this paper; undefined notations and terminology can be found in. A hamiltonian graph is a graph with a spanning cycle, also called a hamiltonian cycle. They note that the spanning cycle is not unique. Now suppose that E' is a nonempty subset...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Selective Watchdog Technique for Intrusion Detection in Mobile Ad-Hoc Network

    Mobile Ad-hoc NETworks (MANETs) is the collection of mobile nodes which are self organizing and are connected by wireless links where nodes which are not in the direct range communicate with each other relying on the intermediate nodes. As a result of trusting other nodes in the route, a malicious...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    A Proposal for Improve the Lifetime of Wireless Sensor Network

    In the Wireless Sensor Network (WSN), sensor nodes are connected together through Radio Frequency (RF). Routing protocol is used to transmit data among sensor nodes. In the paper, the authors proposed a new routing protocol based on LEACH protocol. This is energy-efficient clustering algorithm. The proposed protocol enlarges WSN life-time...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    PAPR Reduction of OFDM Signal by Using Combined Hadamard and Modified Meu-Law Companding Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) is a technique which gives high Quality Of Service (QOS) to the users by mitigating the fading signals as well as high data rates in multimedia services. However, the Peak-to-Average Power Ratio (PAPR) is a technical challenge that reduces the efficiency of RF power amplifiers....

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Network-Aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework

    Rapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. The authors' implementation of a parallel system called KernelHive allows to efficiently running applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Performance Analysis of Channel Access Model for MAC in Randomly Distributed Wireless Sensor Networks

    Medium Access Control (MAC) is one of the fundamental problems in wireless sensor networks. The performance of wireless sensor network depends on it. The main objective of a medium access control method is to provide high throughput, minimize the delay, and conservers the energy consumption by avoiding the collisions. In...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    An Architectural Framework for Delivering SIP-AS Multimedia Services Based on JADE/OSGi Technology

    In this paper, the authors propose a new scalable service-oriented architecture based on Open Service Gateway Initiative (OSGI) technology. A key part of this architecture is its SIP Application as a Service (SIP-AS). It relies on IMS core network supported by multi agent's components implemented using Java Agent DEvelopment (JADE)...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Analysis of IPv6 Transition Technologies

    Currently IPv6 is extremely popular with companies, organizations and Internet Service Providers (ISP) due to the limitations of IPv4. In order to prevent an abrupt change from IPv4 to IPv6, three mechanisms will be used to provide a smooth transition from IPv4 to IPv6 with minimum effect on the network....

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    On the Optimization of Bittorrent-Like Protocols for Interactive On-Demand Streaming Systems

    In this paper, the authors propose two novel optimized BitTorrent-like protocols for interactive multimedia streaming: the Simple Interactive Streaming Protocol (SISP) and the Exclusive Interactive Streaming Protocol (EISP). The former chiefly seeks a trade-off between playback continuity and data diversity, while the latter is mostly focused on playback continuity. To...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Modeling and Designing Resource Efficient Distributed MANET Management System (DMMS)

    Traditional network management systems use spoofing of resources to collect statistical data such as resource usage and performance. This data is exchanged with other resources through management protocols. The amount of data can be extremely high and the bandwidth for overhead management functions increases significantly. Also, the data storage requirements...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    A Novel Intrusion Detection Model for Mobile Ad-Hoc Networks Using CP-KNN

    Mobile ad-hoc network security problems are the subject of in depth analysis. A group of mobile nodes area unit connected to a set wired backbone. In MANET, the node themselves implement the network management in a very cooperative fashion. The entire nodes area unit accountable to create a constellation that...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Performance Evaluation of the Effect of Noise Power Jammer on the Mobile Bluetooth Network

    Network jammers can uncover the reliability of the wireless networks, where the position of the jammer node permits the network to cope with jamming leveraging varieties of defense strategies. Wireless Bluetooth network is a short range network, where the Bluetooth transceiver is operating in the 2.4GHz ISM (Industrial, Scientific and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Improvement of LTE Downlink System Performances Using the Lagrange Polynomial Interpolation

    To achieve a high speed data rate, higher spectral efficiency, improved services and low latency the 3rd generation partnership project designed LTE standard (Long Term Evolution). The LTE system employs specific technical as well the technical HARQ, MIMO transmission, OFDM Access or estimation technical. In this paper the authors focus...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    An Efficient Spectrum Sharing Method Based on Genetic Algorithm in Heterogeneous Wireless Network

    With advances in wireless communication technologies, users can have rich contents not only via wired networks but also via wireless networks such as cellular, Wi-Fi and WiMAX. On the other hand, however, lack of spectrum resources becomes an important problem for future wireless networks. To overcome this problem, dynamic spectrum...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    The Future Directions in Evolving Wi-Fi: Technologies, Applications and Services

    New research directions will lead to fundamental changes in the design of future Wi-Fi networks. However, with an explosion of wireless mobile applications and services, there are still some challenges on the spectrum crisis and high energy consumption. Wireless system designers have been facing the continuously increasing demand for high...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Reducing the Cognitive Load on Analysts Through Hamming Distance Based Alert Aggregation

    Previous paper introduced the idea of grouping alerts at a Hamming distance of 1 to achieve lossless alert aggregation; such aggregated meta-alerts were shown to increase alert interpretability. However, a mean of 84023 daily snort alerts were reduced to a still formidable 14099 meta-alerts. In this paper, the authors address...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Cloud Based Access Control Model for Selective Encryption of Documents With Traitor Detection

    Cloud computing refers to a type of networked computing whereby an application can be run on connected servers instead of local servers. Cloud can be used to store data, share resources and also to provide services. Technically, there is very little difference between public and private cloud architecture. However, the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    A Secure Electronic Payment Protocol for Wireless Mesh Networks

    There are a few payment models proposed in the literature, which can be classified into two categories: the traditional payment model and the micropayment model. Electronic payment systems for wireless mesh networks need to take into account the limited computational and communicational ability of mesh clients. Micropayment scheme is well...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    Packet Drop Attack Detection Techniques in Wireless Ad Hoc Networks: A Review

    Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2014

    A Framework for Analysis and Comparison of Dynamic Malware Analysis Tools

    Malware writers have employed various obfuscation and polymorphism techniques to thwart static analysis approaches and bypassing antivirus tools. Dynamic analysis techniques, however, have essentially overcome these deceits by observing the actual behavior of the code execution. In this regard, various methods, techniques and tools have been proposed. However, because of...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Aug 2014

    Empirical Performance Evaluation of Enhanced Throughput Schemes of IEEE802.11 Technology in Wireless Area Networks

    The success in the growing wireless standards can be measured by the achievement of Quality of Service (QoS) specifications by the designers. The IEEE802.11 wireless standards are widely accepted as wireless technology for wireless LAN. Efforts have been made over the years by the task group to provide adequate number...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Aug 2014

    Highly Reliable Multi-Service Provisioning Using Sequential Prediction of Zone and PL&T of Nodes in Mobile Networks

    In this paper, a dynamic Position Location and Tracking (PL&T) method is proposed which uses an integrated \"Zone finding by predictive algorithm\" and \"Triangulation with dynamic reference positioning\" for target nodes. The nodes can be used as references or targets at different instances of time to maintain accurate PL&T of...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Aug 2014

    Data Collection Scheme for Wireless Sensor Network with Mobile Collector

    In this paper, the authors investigate the problem of designing the minimum number of required mobile elements tours such that each sensor node is either on the tour or one hop away from the tour, and the length of the tour to be bounded by pre-determined value L. To address...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    Qos Enhanced Hybrid Multipath Routing Protocol for Mobile Adhoc Networks

    In Mobile Ad-hoc NETworks (MANET), the Quality of Service (QoS) depends on the available resources in the network and node mobility as mobility may result in frequent route failures. Some existing hybrid approach of multi-path routing technique rarely considers QoS metrics for path selection. In this paper, the authors propose...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    Fast Parallel Sorting Algorithms on GPUs

    This paper presents a comparative analysis of the three widely used parallel sorting algorithms: Odd-even sort, Rank sort and Bitonic sort in terms of sorting rate, sorting time and speed-up on CPU and different GPU architectures. A long side the authors have implemented novel parallel algorithm: min-max butterfly network, for...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    An Efficient Security Approach Using PGE and Parity Coding

    Information attacks are showing the weaknesses of Information security due to the rapid growth of the globalization. The main aim of these attacks is to retrieve the information by illegal that shows the faults in the security services. In this paper, the authors introduce a novel secure steganographic approach for...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    Performance Assessment of Communication Network in WAMS

    Wide Area Measurement Systems (WAMS) based on Synchronized Measurement Technology (SMT) is getting considerable attention worldwide from the power system engineers in last few years. The fast and synchronized measurements facilitate the real time Wide Area Monitoring and Control (WAMC) of the power system. The backbone of WAMS is high...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    Enhancement of TCP Performance with the Help of Snoop Protocol in Wired Cum Wireless Network

    The TCP networks have been the only communication for wired media that followed IEEE 802.3 networks. This paper attempts to provide a comprehensive overview of this Link Layer approach, i.e., Snoop protocol that improving throughput of TCP in wireless networks. It explains the role of Snoop protocol that overcomes the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    Mining Association Rule for Horizontally Partitioned Databases Using Ck Secure Sum Technique

    The security of the large database becomes a serious issue while sharing the data to the network against unauthorized access. However, in order to provide the security many researchers cited the issue of Secured Multiparty Computation (SMC) that allows multiple parties to compute some function of their inputs without disclosing...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    A Method of Detecting SQL Injection Attack to Secure Web Applications

    Web applications are becoming an important part of the people daily life. So attacks against them also increases rapidly. Of these attacks, a major role is held by SQL Injection Attacks (SQLIA). This paper proposes a new method for preventing SQL injection attacks in JSP web applications. The basic idea...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    A Beaconing Approach with Key Exchange in Vehicular Ad Hoc Networks

    Vehicular Ad-hoc NETworks (VANETs) are special forms of Mobile Ad-hoc NETworks (MANETs) that allows vehicles to communicate together in the absence of fixed infrastructure. In this type of network beaconing is the means used to discover the nodes in its neighborhood. For routing protocol successful delivery of beacons containing speed,...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    MECB-AODV: A Modified Energy Constrained Based Protocol for Mobile Ad Hoc Networks

    Mobile ad-hoc networks are collection of mobile devices connected by wireless links to perform some computational tasks. This temporary arrangement does not have any infrastructure hence lacking in permanent source of energy. To fulfill this requirement these independent mobile devices are entirely dependent on battery power. The aim of this...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    GSM Based Embedded System for Remote Laboratory Safety Monitoring and Alerting

    This paper aims to modify an existing safety and security model for the environment of educational institutions and in home. The aim of this project is to design an embedded system for remote monitoring of the laboratory environment. Now-a-days, remote monitoring the laboratory and its building is necessary for safety...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    Evaluation of Data Processing Using Mapreduce Framework in Cloud and Standalone Computing

    An effective technique to process and analyze large amounts of data is achieved through using the MapReduce framework. It is a programming model which is used to rapidly process vast amount of data in parallel and distributed mode operating on a large cluster of machines. Hadoop, an open-source implementation, is...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Nov 2012

    Wireless Sensor Network in Niger Delta Oil and Gas Field Monitoring: The Security Challenges and Countermeasures

    The IEEE 802.15.4 specification has enabled low-power, low-cost and smart Wireless Sensor Networks (WSNs) capable of robust and reliable multi-hop communications. An International Oil and gas Company (IOC), Shell Petroleum Development Company (SPDC), became the first multinational Oil and Gas Company operating in the Nigeria Niger Delta region to switch...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Evaluation of Parameters for Improving Handoff Performance in Mobile WiMAX Networks

    Mobile WiMAX is the latest technology that promises broadband wireless access over long distance. In order to support mobility and continuous network connectivity in mobile WiMAX, it is necessary to provide handoff. Handoff is an essential process in wireless networks to guarantee continuous and effective services. This paper focuses on...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Cross-Layer Energy Optimization in Cooperative Cellular Systems

    Cooperative networking is currently under standardization for future wireless cellular systems. This paper considers energy efficient transmission schemes in cooperative cellular transceiver systems. In which, the authors analyze how to minimize energy consumption per information bit in single link. Further, Target bit error probability, Packet length, Retransmission and Transmission distance...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Efficient Stagnation Avoidance for Manets with Local Repair Strategy Using ANT Colony Optimization

    Wireless networks such as Mobile Ad-hoc NETworks (MANETs) have many advantages compared to wired networks. In MANETs the communication is not limited to a certain geometrical region. Swarm Intelligence based ACO algorithms provide interesting solutions to network routing problems. ACO based routing in MANETs will enhance the reliability and efficient...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    RFID and IP Based Object Identification in Ubiquitous Networking

    Ubiquitous networking is an integrated part of future networking technology that can provide capabilities for connecting all of objects (computers, human, PDAs, cell phones, etc.) in future network. It has to meet the challenge of seamless connection for communication between human and objects in internet infrastructure. Unique object identification is...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Enhancing Highway Traffic Safety Through Intelligent Car

    The transportation domain has already moved towards intra-vehicle intelligent spaces. In this paper, the authors will use various wireless technologies for traffic safety. This safety will be provided by developing a model for intelligent transportation system applications using emerging wireless communication technology in emergency situations. The performance analysis of the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Generalized Affine Transformation Based on Circulant Matrices

    The secure transmission of any form of data over a communication medium is prime important across the globe or in research arena. Cryptography is a branch of cryptology and it provides security for data transmission between any communicating parties. The Hill cipher is one of the symmetric key substitution algorithms....

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Performance Investigation of 802.11 MAC DCF

    In the 802.11 protocol, DCF can be termed as an important mechanism in order to access the medium (Channel). This scheme is a random access based scheme which has its fundamentals based upon the efficient usage of CSMA/CA protocol. The retransmission of various collided packets is effectively managed in accordance...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Energy Efficient Topologies for Wireless Sensor Networks

    A wireless network is a group of spatially dispersed specialized transducers with a sensing, computing and communication infrastructure which intends to give them the ability to sense and record various conditions in a monitored environment. They act as interfaces between real and virtual worlds. They are the most rapidly developing...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Scaling Up of E-MSR Codes Based Distributed Storage Systems with Fixed Number of Redundancy Nodes

    Distributed storage systems are becoming more and more popular with the rapidly increasing demand for large-scale data storage. To increase the capacity and I/O performance of a distributed storage system, scaling it up is a common method. Regenerating Codes are a class of distributed storage codes that offer good reliability...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Scrutiny New Framework in Integrated Distributed Reliable Systems

    In this paper, the authors represent a new framework for integrated distributed systems. In the proposed framework they have used three parts to increase satisfaction and performance of this framework. At first they analyze integrated systems and their evolution process and also ERPSD and ERPDRT framework briefly then they explain...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Role of Multi Agent System for QoS Guarantee in Cellular Networks

    The paper highlights the benefits of multi agent system for maintaining QoS in cellular network by evaluating various multi agent based call admission control strategies for different traffic conditions. It establishes the effect of degree of distribution of agents on system performance by comparing the two service architectures, namely centralized...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2010

    Energy Efficient Data Processing in Visual Sensor Network

    Identifying moving objects from a video sequence is a fundamental and critical task in many computer vision applications. After the images are captured they must be processed and then sent to the server. In this paper the authors characterize the energy consumption of a visual sensor network test bed. Each...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2012

    Analyzing of Pseudo-Ring Memory Self-Testing Schemes with Algorithms

    In this paper, scan and ring schemes of the pseudo-ring memory self-testing are investigated. Both schemes are based on emulation of the linear or nonlinear feedback shift register by memory itself. Peculiarities of the pseudo-ring schemes implementation for multi-port and embedded memories, and for register file are described. It is...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2012

    Performance of Power Decentralized Detection in Wireless Sensor System with DS-CDMA

    Wireless sensor networks take great importance in recent years according to their potential applications in different areas like health monitoring, military applications, tactile system and industrial applications. In this paper the decentralized sensing with noise and band limited channel between the sensor nodes and merging stations (fusion center) for different...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2012

    Analyzed Virtual Routing Protocol for Future Networks (MANET & Topological Network)

    The Mobile Ad-hoc NETwork (MANET) is a wireless unstructured network and this has mostly suggested for multimedia streaming efficiency. The hackers attacks are reduce the capacity and efficiency of network in MANET. There are various types of protocol are used for the communication in MANET, but security is lacking in...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jul 2012

    Demultiplexing of Signals on the Downlink OFDM in UTRAN-FDD

    One problem which arises in analog communication or digital communications networks in telecommunications, especially in third generation cellular networks, is the signal reception without a total degradation of the transmitted signal. In this paper, the authors have analyzed the received signal without multipath at Additive White Gaussian Noise (AWGN) with...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Oct 2012

    Machine Learning Algorithms in Web Page Classification

    In this paper, the authors use machine learning algorithms like SVM, KNN and GIS to perform a behavior comparison on the web pages classifications problem, from the experiment they see in the SVM with small number of negative documents to build the centroids has the smallest storage requirement and the...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Jun 2012

    New-Fangled Method Against Data Flooding Attacks in MANET

    Mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Hence, the authors expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Apr 2012

    MPPSOCGEN: A Framework for Automatic Generation of MPPSOC Architecture

    Automatic code generation is a standard method in software engineering since it improves the code consistency and reduces the overall development time. In this context, this paper presents a design flow for automatic VHDL code generation of mppSoC (massively parallel processing System-on-Chip) configuration. Indeed, depending on the application requirements, a...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Apr 2012

    Cost Breakdown of Public Cloud Computing and Private Cloud Computing and Security Issues

    Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centers that provide those services. These services have long been referred to as Software as a Service (SaaS). Some terms such as PaaS (Platform as a Service) and...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Apr 2012

    Review on Common Criteria as a Secure Software Development Model

    Standards, models, frameworks and guidelines have been developed for secure software development such as such as Common Criteria, SSE-CMM, Microsoft SDL, OpenSAMM. Current standards and models provide guidance for particular areas such as threat modelling, risk management, secure coding, security testing, verification, patch management, configuration management etc. But there is...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2012

    Dynamic Validity Period Calculation of Digital Certificates Based on Aggregated Security Assessment

    The paper proposes a method based on different security-related factors to dynamically calculate the validity period of digital certificates. Currently validity periods are most often defined statically without scientific justification. This approach is not sufficient to objectively consider the actual need for security. Therefore the approach proposed in this paper...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2012

    New Digital Signature Protocol Based on Elliptic Curves

    A lot of practical algorithms for digital signature have been developed since the invention of the public key cryptography in the late 1970's. Let them recall the principle of these methods. The signer Alice needs to possess two kinds of keys. The first one is private, must be kept secret...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2012

    Rectified Differential Cryptanalysis of 16 Round Present

    PRESENT is an ultra-lightweight block cipher, proposed by A.Bogdanov et al. in CHES 2007 for extremely constrained environments such as RFID tags and sensor networks. Differential attack against 16 round PRESENT was given by Wang using 264 chosen plaintexts, 232 6- bit counters and 264 memory accesses and it was...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Dec 2012

    Deployment of Reverse Proxy for the Mitigation of SQL Injection Attacks Using Input-Data Cleansing Algorithm

    Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. Hackers find new methods to intrude the applications and the web application vulnerability reported is increasing year after year. One such...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Safety Measures and Privacy in E-Passport Scheme Using Cryptographic Protocols and Biometrics Technology

    Electronic passports have known a wide and fast employment all around the world since the International Civil Aviation Organization (ICAO) the human race has adopted standards whereby electronic passports can store biometrics identifiers. The purpose of electronic passports is to prevent the illegal entry of traveler into a particular country...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Language-Based Security to Apply Computer Security

    Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating...

    Provided By Academy & Industry Research Collaboration Center

  • White Papers // Sep 2012

    Novel Elliptic Curve Scalar Multiplication Algorithms for Faster and Safer Public-Key Cryptosystems

    Efficient and secure public-key cryptosystems are essential in today's age of rapidly growing Internet communications. Elliptic curve scalar multiplication in particular, which refers to the operation of multiplying a large integer by a point on an elliptic curve, is crucial for both data encryption technology as well as testing the...

    Provided By Academy & Industry Research Collaboration Center