Adhiyamaan College of Engineering

Displaying 1-18 of 18 results

  • White Papers // Jun 2013

    Enabling Self Auditing for Mobile Clients in Cloud Computing

    Cloud is a rising technology that works over the Internet and it permits the user to urge the service from anyplace and at any time with pay per usage theme. Cloud computing makes the business environment easier by offering huge storage capacity, processing power and infrastructure with the elastic demand....

    Provided By Adhiyamaan College of Engineering

  • White Papers // Mar 2013

    Secure Protocol for Leader Election and Intrusion Detection in MANET

    As the nodes in MANET are battery limited, one node per cluster is elected as leader to run IDS for all the nodes in the cluster. Leader is elected based on the residual energy of each node that is sufficient to run IDS. Too much of resources are wasted for...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Abstraction and Efficiency for MANET Using Reverse Bellman Ford Algorithm

    Mobile wireless ad hoc networks are infrastructure less. It is significant in bringing out a comparison of the various routing protocols for better understanding and implementation of them. Many theoretical studies show that efficiency of the routing and forwarding of data packets in a wireless ad hoc network can be...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Cluster Based Leader Election and Intrusion Detection System for MANET

    As the nodes in MANET are battery limited, one node per cluster is elected as leader to run IDS for all the nodes in the cluster. Leader is elected based on the residual energy of each node that is sufficient to run IDS. Too much of resources are wasted for...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Localized QOS Routing in Mobile Adhoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self configuring Network of mobile devices connected by a wireless link without fixed infrastructure. In MANETs, the data packet may fail to be delivered for various reasons including nodes movement, packet collision and bad channel condition. Because re-route recovery of traditional on-demand routing...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Trust Based Resource Allocation Technique for Anonymous Secure On-Demand Routing in MANETs

    In this paper the scheme called Trust based management system is defined to allow trustworthy intermediate nodes to participate in path construction with resource reservation technique to allow trusted nodes to select a path which has minimum cost, congestion and bandwidth. In reservation technique, if available bandwidth is greater than...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Rendezvous Based Data Dissemination in Wireless Sensor Network

    Energy spent in the wireless sensor network while collecting the data via the multihop transmission mechanism. To address these issues Mobicluster protocol has been implemented which is based on the rendezvous based approach. The Mobicluster protocol has been is not applicable in the situation were connected and disconnected network. It...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Sep 2012

    Effective Analysis of Cloud Based Intrusion Detection System

    The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of Intrusion Detection Systems (IDS). People are paid more attention on intrusion detection which...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Safe and Sound Network Coding for Wireless Video Streaming

    Nowadays, viewing video has become simplified using video transmission over a network. Using video streaming, Web user does not have to wait to download a file to play it. Instead, the media is sent in a continuous stream of data and is played as it arrives. When a video has...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Improving the Bandwidth Utilization by Recycling the Unused Bandwidth in IEEE 802.16 Networks

    The Physical and MAC layers have been specified in IEEE 802.16 networks. The quality of service is ensured by the bandwidth reservation. The subscriber station should reserve the bandwidth more than its demand. But the bandwidth is fully utilized by SS, but not all the time. So the bandwidth has...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Higher Quality of Service Through Peer-Assisted Streaming and Layered Video Coding

    LIVE media streaming applications have become more and more popular. IP multicast is the most efficient mechanism, but Due to the practical issues of routers, IP multicast has not been widely deployed in the wide-area network infrastructure. The application-level solution build a Peer-To-Peer (P2P) overlay network out of unicast tunnels...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Intrusion Detection Mechanism Based on Cloud Computing Security Services

    The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of Intrusion Detection Systems (IDS). People are paid more attention on intrusion detection which...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2012

    Security Threats and Jamming Attacks of Multi Channel Wireless Sensor Networks

    Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Nov 2011

    Analysis of the Characteristics and Trusted Security of Cloud Computing

    Cloud computing allows people the way to sharing distributed resources and services that belong to various organizations and sites. The cloud computing has its own concept, technical, economic and user experience characteristics. The service oriented, loose coupling, strong fault tolerant, business model and ease use are main characteristics of cloud...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Oct 2011

    Analysis of Mobility Management in Wireless Mesh Networks Using Random Walk Model

    A user-based mobility management scheme for WMN's namely, the static anchor scheme and dynamic anchor scheme. Both schemes are based can be extended to WMNs that have multiple gateways. In addition, the authors plan to investigate the proposed schemes under more realistic mobility models the random walk model. The Random...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Sep 2011

    Efficient Distributed Mutual Exclusion for Dynamic Nodes in Mobile Ad Hoc Networks

    Mobile Ad-hoc network is a self-configuring network of mobile routers connected by wireless links. This union forms a random topology. Mutual Exclusion in distributed mobile ad-hoc network ensures that only one process can access shared resources at a time. If at that time, other process requests for those shared resources,...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Sep 2011

    Measurements of Location Distinction in Wireless Sensor Network Using Frequency Domain Link Signature

    Traditionally, a lot of issues in wireless sensor network using Temporal Link Signature, especially in the part of False alarm rate and Moment Detection. Here the authors mainly focus on Frequency Domain-Link Signature, which is the alternate method for temporal link signature. In general, they use of wider bandwidths and...

    Provided By Adhiyamaan College of Engineering

  • White Papers // May 2011

    Computing Conditional Intermeeting Time in Conditional Shortest Path Routing

    Delay tolerant networks are characterized by the sporadic connectivity between their nodes. The Sporadic connectivity leads to lack of stable end-to-end paths from source to destination. Since the future node connections are mostly unknown in these networks, opportunistic forwarding is used to deliver messages. In Intermeeting time, to making effective...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Abstraction and Efficiency for MANET Using Reverse Bellman Ford Algorithm

    Mobile wireless ad hoc networks are infrastructure less. It is significant in bringing out a comparison of the various routing protocols for better understanding and implementation of them. Many theoretical studies show that efficiency of the routing and forwarding of data packets in a wireless ad hoc network can be...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Cluster Based Leader Election and Intrusion Detection System for MANET

    As the nodes in MANET are battery limited, one node per cluster is elected as leader to run IDS for all the nodes in the cluster. Leader is elected based on the residual energy of each node that is sufficient to run IDS. Too much of resources are wasted for...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Localized QOS Routing in Mobile Adhoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self configuring Network of mobile devices connected by a wireless link without fixed infrastructure. In MANETs, the data packet may fail to be delivered for various reasons including nodes movement, packet collision and bad channel condition. Because re-route recovery of traditional on-demand routing...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Trust Based Resource Allocation Technique for Anonymous Secure On-Demand Routing in MANETs

    In this paper the scheme called Trust based management system is defined to allow trustworthy intermediate nodes to participate in path construction with resource reservation technique to allow trusted nodes to select a path which has minimum cost, congestion and bandwidth. In reservation technique, if available bandwidth is greater than...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2013

    Rendezvous Based Data Dissemination in Wireless Sensor Network

    Energy spent in the wireless sensor network while collecting the data via the multihop transmission mechanism. To address these issues Mobicluster protocol has been implemented which is based on the rendezvous based approach. The Mobicluster protocol has been is not applicable in the situation were connected and disconnected network. It...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Mar 2013

    Secure Protocol for Leader Election and Intrusion Detection in MANET

    As the nodes in MANET are battery limited, one node per cluster is elected as leader to run IDS for all the nodes in the cluster. Leader is elected based on the residual energy of each node that is sufficient to run IDS. Too much of resources are wasted for...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Sep 2012

    Effective Analysis of Cloud Based Intrusion Detection System

    The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of Intrusion Detection Systems (IDS). People are paid more attention on intrusion detection which...

    Provided By Adhiyamaan College of Engineering

  • White Papers // May 2011

    Computing Conditional Intermeeting Time in Conditional Shortest Path Routing

    Delay tolerant networks are characterized by the sporadic connectivity between their nodes. The Sporadic connectivity leads to lack of stable end-to-end paths from source to destination. Since the future node connections are mostly unknown in these networks, opportunistic forwarding is used to deliver messages. In Intermeeting time, to making effective...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Nov 2011

    Analysis of the Characteristics and Trusted Security of Cloud Computing

    Cloud computing allows people the way to sharing distributed resources and services that belong to various organizations and sites. The cloud computing has its own concept, technical, economic and user experience characteristics. The service oriented, loose coupling, strong fault tolerant, business model and ease use are main characteristics of cloud...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Feb 2012

    Security Threats and Jamming Attacks of Multi Channel Wireless Sensor Networks

    Built upon a shared wireless medium, wireless sensor network is particularly vulnerable to jamming attacks. These attacks can easily be accomplished by an adversary by either bypassing MAC-layer protocols or emitting a radio signal targeted at jamming a particular channel. This paper considers a scenario where a sophisticated jammer jams...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Sep 2011

    Measurements of Location Distinction in Wireless Sensor Network Using Frequency Domain Link Signature

    Traditionally, a lot of issues in wireless sensor network using Temporal Link Signature, especially in the part of False alarm rate and Moment Detection. Here the authors mainly focus on Frequency Domain-Link Signature, which is the alternate method for temporal link signature. In general, they use of wider bandwidths and...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Sep 2011

    Efficient Distributed Mutual Exclusion for Dynamic Nodes in Mobile Ad Hoc Networks

    Mobile Ad-hoc network is a self-configuring network of mobile routers connected by wireless links. This union forms a random topology. Mutual Exclusion in distributed mobile ad-hoc network ensures that only one process can access shared resources at a time. If at that time, other process requests for those shared resources,...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Oct 2011

    Analysis of Mobility Management in Wireless Mesh Networks Using Random Walk Model

    A user-based mobility management scheme for WMN's namely, the static anchor scheme and dynamic anchor scheme. Both schemes are based can be extended to WMNs that have multiple gateways. In addition, the authors plan to investigate the proposed schemes under more realistic mobility models the random walk model. The Random...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Higher Quality of Service Through Peer-Assisted Streaming and Layered Video Coding

    LIVE media streaming applications have become more and more popular. IP multicast is the most efficient mechanism, but Due to the practical issues of routers, IP multicast has not been widely deployed in the wide-area network infrastructure. The application-level solution build a Peer-To-Peer (P2P) overlay network out of unicast tunnels...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Safe and Sound Network Coding for Wireless Video Streaming

    Nowadays, viewing video has become simplified using video transmission over a network. Using video streaming, Web user does not have to wait to download a file to play it. Instead, the media is sent in a continuous stream of data and is played as it arrives. When a video has...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Improving the Bandwidth Utilization by Recycling the Unused Bandwidth in IEEE 802.16 Networks

    The Physical and MAC layers have been specified in IEEE 802.16 networks. The quality of service is ensured by the bandwidth reservation. The subscriber station should reserve the bandwidth more than its demand. But the bandwidth is fully utilized by SS, but not all the time. So the bandwidth has...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Apr 2012

    Intrusion Detection Mechanism Based on Cloud Computing Security Services

    The goal of IDS is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of Intrusion Detection Systems (IDS). People are paid more attention on intrusion detection which...

    Provided By Adhiyamaan College of Engineering

  • White Papers // Jun 2013

    Enabling Self Auditing for Mobile Clients in Cloud Computing

    Cloud is a rising technology that works over the Internet and it permits the user to urge the service from anyplace and at any time with pay per usage theme. Cloud computing makes the business environment easier by offering huge storage capacity, processing power and infrastructure with the elastic demand....

    Provided By Adhiyamaan College of Engineering