ACCENTS

Displaying 1-40 of 125 results

  • White Papers // Dec 2012

    A Survey on Energy Consumption in Routing Protocols for MANET Using Cross Layer

    This paper presents the exhaustive search on reduced energy consumption routing protocols for MANET using cross layer. There are so many techniques available for energy consumption in routing protocols. MANET is a collection of wireless mobile nodes that forms a temporarily dynamic network without any centralized administrator. Each node in...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Analysis of Information Systems Security Issues and Security Techniques

    Over the years, world witnessed a dramatically rise in count of the users who are in some way or other involved in data based software's use and development. A large pool of data and information is available over the internet for sharing. The social websites, personnel websites, banks database, NGO's...

    Provided By ACCENTS

  • White Papers // Dec 2012

    An Efficient Load Balancing Using Genetic Algorithm in Hierarchical Structured Distributed System

    In this paper, a genetic algorithm based approach for job scheduling in distributed system considering dynamic load balancing is discussed. The underlying distributed system has hierarchical structure and job scheduling is done in two levels: group level and node level. Scheduling in distributed system involves deciding not only when to...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Securing Storage Data in Cloud Using RC5 Algorithm

    Cloud Computing is technology for next generation Information and Software enabled work that is capable of changing the software working environment. It is interconnecting the large-scale computing resources to effectively integrate, and to computing resources as a service to users. Cloud computing allows users to use applications without installation any...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Intelligent Traffic System for VANET: A Survey

    During the last decades, the total number of vehicles around the world growing enormously. Therefore the focus of manufactures, researchers and government is shifting towards improving the on road safety rather than improving the quality of the roads. The vast development in the wireless technologies emerged a new type of...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Study of Efficient Utilization of Power Using Green Computing

    Green computing or green IT, basically concerns to environmentally sustainable computing or IT. The field of green computing is defined as "The knowledge and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems - which include printers, monitors, and networking, storage devices and communications systems -...

    Provided By ACCENTS

  • White Papers // Dec 2012

    A Review of Network Forensics Techniques for the Analysis of Web Based Attack

    Network forensics has been the most prevalent technology to investigate different attack. It used for troubleshooting connection issues and helping to solve various network security problems, such as system log, router log, and access control. Network forensic help to identify the evidences of data source as intermediate side and the...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Softening Misbehaviour of Nodes and Enforcing Cooperation in Mobile Ad Hoc Networks

    In ad-hoc wireless network nodes have constraints of resources like CPU cycles, memory, battery power, software, because of which they are not always willing or able to forward others data over the network even if they have previously agreed to do so; also nodes owned by different entities can try...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Removal of IEEE 802.15.4 MAC Unrelaibility Problem in Hardware

    IEEE 802.15.4 systems suffer from serious MAC unreliability problem due to contention based MAC protocol used for channel access and its default parameter values. Reliability issues arise on case of energy efficiency when power management is enabled; packet loss when number of contending nodes is increased. A method to use...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Effect of BER Performance in RLS Adaptive Equalizer

    Wireless communication systems operating over time-varying fading channels require adaptive signal processing to equalize the channel variations at the receiver. In wireless applications, the received signal is typically affected by frequency-selective fading and channel equalization is required to mitigate the resulting Inter Symbol Interference (ISI). In this paper an adaptive...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Improving Performance Guarantees in Cloud Computing Through Efficient and Dynamic Task Scheduling

    Cloud Computing has changed the way the people think about technology. It is a computing model that provides web based software, middleware and other computing resources on demand by deploying technology as a service. Eucalyptus is one of the open source software computing model that provides Infrastructure as a Service...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Secure and Cost Effective Framework for Cloud Computing Based on Optimization and Virtualization

    Cloud computing is emerging technology in today's era. Its popularity is because of flexibility, scalability, cost reduction and on-demand service. But there is the demand of security in User-Cloud environment, because of dependency increases on the cloud. Several companies chooses cloud environment for business prospective. So when the authors choose...

    Provided By ACCENTS

  • White Papers // Dec 2012

    One Step Towards Finding AOA/TOA for Mobile Location

    Due to development of technology mobile devices are becomes more common, to satisfy increasing demand of mobile communication more accurate calculations are required. In mobile communication angle of arrival and time of arrival plays important role for determining the actual position of the mobile nodes. In this paper, the authors...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Study and Analysis of Data Sharing and Communication With Multiple Cloud Environments

    Cloud storage enables users to access their data anywhere and at any time. It achieves the dream of getting computing, storage and communication resources as easy as to get water and electricity. All resources can be gotten in a plug-and-play way. It has the advantages of high scalability, ease-of-use, cost-effectiveness...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Bit Level Generalized Modified Vernam Cipher Method With Feedback

    This paper discusses how the vernam cipher method can be extended to a new symmetric key cryptographic method called Bit Level generalized modified vernam cipher method with feedback. Nath et al already developed a method called BLES version-I where they have used extensive bit level permutation encryption method. Nath et....

    Provided By ACCENTS

  • White Papers // Dec 2012

    Static Security Analysis of Power System Networks Using Soft Computing Techniques

    In this paper an EP and PSO based optimization algorithms have been proposed for solving optimal power flow problems with multiple objective functions. These algorithms take into consideration all the equality and inequality constraints. The improvement in system performance is based on reduction in cost of power generation and fuzzy...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Identification of Node Behavior for Mobile Ad-Hoc Network

    In AODV (Ad-hoc On demand Distance Vector Routing), the network is silent until a connection is needed. At point of time when a node needs to establish a connection broadcasts a request Root ReQuest Packet (RREQ) for connection. Other nodes of AODV forward this message, and record the node that...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Algorithm for Minimizing Network Cost in WDM Network

    This paper is based on a novel heuristic algorithm for routing and wavelength assignment in virtual wavelength path routed WDM network. In this paper, the authors have considered a wavelength routed WDM optical network and the Heuristic algorithm is implemented on it. The term heuristics is used for algorithm, which...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Distributed Approach of Intrusion Detection System: Survey

    Intrusion Detection Systems (IDS) are now becoming one of burning issue for any organization's network. Intruders always search for vulnerabilities or flaws in target system and attack using different techniques. An Intrusion Detection System (IDS) is needed to detect and respond effectively whenever the confidentiality, integrity, and availability of computer...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Half-Wave Dipole Antenna for GSM Applications

    The dipole antenna or dipole aerial is one of the most important and commonly used types of RF antenna. It is widely used on its own, and it is also incorporated into many other RF antenna designs where it forms the driven element for the antenna. In this paper, an...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Wireless Switch for Saving Electricity

    The authors are going to represent an electrical switch that can change its behaviour through wireless. Realization of switch for saving electricity, they are interested to deal with such an implementation that can switch ON or OFF the electrical components on the basis of the status of the user. If...

    Provided By ACCENTS

  • White Papers // Dec 2012

    A Brief Overview of the Developments of the Cognitive Radio Technology

    Cognitive radio's rising popularity among various engineers, scientists and researchers can be credited to the increasing number of users of wireless technology and the radio spectrum which is limited. In this paper, various advances which have been made so far to improvise cognitive radio technology have been discussed in brief...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Privacy and Security Issues in Cloud Computing

    Cloud computing - a relatively recent term, defines the paths ahead in computer science world. Being built on decades of research it utilizes all recent achievements in virtualization, distributed computing, utility computing, and networking. It implies a service oriented architecture through offering software and platforms as services, reduced information technology...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Energy Efficient Adaptive Routing Algorithm in MANET With Sleep Mode

    An ad hoc network is a group of mobile wireless nodes that collectively form a network among themselves without any permanent infrastructure. One major area of research within ad hoc networks is energy consumption issue. The primary goal of ad hoc networks is to describe for the energy-restricted protocols. Energy...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Constant Modulus Blind Equalization for Time-Varying MIMO-FIR Channels With Pulse Estimation

    The Constant Modulus (CM) property of source signal can be mostly utilized to equalize the single-input multiple-output and Finite Impulse Response (FIR) channels. In existing, the channels are blindly equalized and the equalization methods are based on higher order statistics that estimates all non-zero channel pulsation under time-invariance assumption. However,...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Adaptive Mapping for Reducing Power Consumption on NoC-Based MPSoC

    Intricacy of the S/W increased considerably nowadays. It needs smart application specific architectures as NoC based MPSoCs to achieve the high data communication with computation requirements. The design of these systems needs efficient functionalities accumulating fragmenting and mapping. In this manner, this paper makes partitioning and mapping influence on energy...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Mobile Cloud Computing Through J2ME Application: Cloud Enabled Web Services

    Advancement in mobile computing and application of the J2ME applications are become out dated. J2ME mobiles are low cost, energy efficient and with long battery life. But these mobile having less processing capabilities then newly designed mobile devices. Thus required to enhance the processing capability of these mobile thus required...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Economic Price Estimation for Cloud Business

    A cloud server connection consists of an occurrence of shared database architecture server and at least one front-end network server. When users request data from cloud server, the cloud application, running on the front-end network server, retrieves all the relevant data from backend to handle the manipulator request. Although, this...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Improving Network Scalability Using NoSql Database

    The traditional database is designed for the structured data and the complex query. In the environment of the cloud, the scale of data is very large, the data is non-structured, the request of the data is dynamic, these characteristics raise new challenges for the data storage and administration, in this...

    Provided By ACCENTS

  • White Papers // Dec 2012

    Mall Navigation System Using Wi-Fi Router

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. A shopping Mall is a vast place, & the people often get confused with the direction of the nearest ATMs or even rest rooms. So the authors...

    Provided By ACCENTS

  • White Papers // Mar 2013

    A Comprehensive study on Cloud Green Computing: To Reduce Carbon Footprints Using Clouds

    Cloud computing and Green computing are two most emergent areas in Information Communication Technology (ICT) with immense applications in the entire globe. The future trends of ICT will be more towards cloud computing and green computing. Due to tremendous improvements in computer networks now the people prefer the Network-based computing...

    Provided By ACCENTS

  • White Papers // Mar 2013

    Verification of Data Reliability and Secure Service for Dynamic Data in Cloud Storage

    Cloud computing has been the genuine solution to the rising storage costs of IT Enterprises. The cost of data storage devices is too high rate at which data is being generated, where the enterprises or individual users to frequently update their hardware or software. The data outsourced to the cloud...

    Provided By ACCENTS

  • White Papers // Mar 2013

    A Novel Approach for Improving the Performance of TCP by TCP Reno and SACK Acknowledgement in High Traffic Density Conditions With Cognitive Radios

    The key factors that contribute to TCP's performance degradation as TCP losses, MAC link failure detection latency, Route computation time and, Link failure notification latency Transmission Control Protocol (TCP) is the dominating end-to-end transport layer protocol which provides secure and reliable data transfer with some other protocols. The authors identify...

    Provided By ACCENTS

  • White Papers // Mar 2013

    An Evaluation of MANET Routing Protocol

    Clustering in Mobile Ad Hoc NETworks (MANETs) has much better utilization compared to the conventional system. Other than the highly active and unbalanced nature of MANETs makes it hard for the cluster based routing protocols to split a mobile network into clusters and determination of cluster heads for each cluster....

    Provided By ACCENTS

  • White Papers // Mar 2013

    Performance Evaluation Using J2ME With Android Over Cloud Services: A Simulation Approach

    Now-a-days the greatest challenge to the cyber world is security. The authors need more and more security for their unsecured systems because technology is not a constant factor. There are lots of catalysts, can break the security system. Day by day number of hackers is being increased. Existing old methods...

    Provided By ACCENTS

  • White Papers // Mar 2013

    Renovated Cluster Based Routing Protocol for MANET

    A MANET can be defined as a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. The mobile hosts are not bound to any centralized control like base stations or mobile switching centers. In such...

    Provided By ACCENTS

  • White Papers // Mar 2013

    Design of Rectangular Stepped DRA for Wireless Local Area Network (Wlan) Applications

    In this paper, a Dielectric Resonator Antenna (DRA) is presented for Wireless Local Area Network (WLAN) applications. Here three rectangular dielectric resonators are used as stepped manner. The DRA is excited by microstrip line which is an effective feed mechanism to obtain better radiation. In this design, rectangular shape was...

    Provided By ACCENTS

  • White Papers // Mar 2013

    A Survey on Different Approaches for Energy Conservation in Wireless Sensor Networks

    In the recent years the applications of wireless sensor networks in the fields such as scientific, military and healthcare have developed. So it has gained more attention in research area. A sensor node is basically a battery powered device and the use of battery has become a constraints. The main...

    Provided By ACCENTS

  • White Papers // Mar 2013

    Research on Qualitative Analysis of LEACH With Wormhole Attack in Wireless Sensor Network

    Wireless sensor networks are real time distributed systems often deployed in ad hoc fashion with self-configuring capability along with ability to connect wirelessly at extremely low cost, makes WSN a promising technology for wide range of applications. Routing is a major issue in development of Wireless sensor network. Due to...

    Provided By ACCENTS

  • White Papers // Mar 2013

    Effective Performance Evaluation of On-Demand Routing Protocol for Cognitive Radio Ad Hoc Network

    To solve spectrum decision and route selection problem which have vital role in Cognitive Radio Ad Hoc Network (CRAHN), many researchers developed different methodology how efficiently select the proper route between source and destination. In this paper it has been analyzed the efficiency and routing load of on-demand routing protocol...

    Provided By ACCENTS