Anna University

Displaying 1-40 of 193 results

  • White Papers // Dec 2014

    Low Power FSK Modulation and Demodulation Using VHDL

    Frequency Shift Keying (FSK) is the most common form of digital modulation in the high-frequency radio spectrum, and has important applications in telephone circuits. Binary FSK (usually referred to simply as FSK) is a modulation scheme typically used to digital information between digital equipment such as tele printers and computers....

    Provided By Anna University

  • White Papers // Oct 2014

    A Survey on Deadline Constrained Workflow Scheduling Algorithms in Cloud Environment

    Cloud computing is the latest blooming technology in the era of computer science and information technology domain. There is an enormous pool of data centers, which are termed as clouds where the services and associated data are being deployed and users need a constant Internet connection to access them. One...

    Provided By Anna University

  • White Papers // May 2014

    Mining Search Log for Privacy Definitions and Phish Safe

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. Some commonly used black hat techniques has been characterized and proposed a new way to counter...

    Provided By Anna University

  • White Papers // Apr 2014

    Detect SQLI Attacks in Web Apps Using NVS

    Now-a-days the world of information era, the authors can get information just their single click by using web application. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. It are playing a...

    Provided By Anna University

  • White Papers // Dec 2013

    Effective Ant Based Routing Algorithm for Data Replication in Manets

    In mobile ad hoc network, the nodes often move and keep on change its topology. Data packets can be forwarded from one node to another on demand. To increase the data accessibility data are replicated at nodes and made as sharable to other nodes. Assuming that all mobile host cooperative...

    Provided By Anna University

  • White Papers // Nov 2013

    Optimization of Vertical Links in a Three-Dimensional NOC Based Multicore Crypto Processor for Cloud Computing

    The popularity of multiprocessors over the last few years has been made possible by Network-on-Chip (NoC). The advent of Three-Dimensional Network-on-Chip (3D NoC) has facilitated the communication in Three-Dimensional Integrated Circuits (3D IC). However, the implementation of 3D NoC is a vital issue with the fabrication of Through-Silicon-Via (TSV), due...

    Provided By Anna University

  • White Papers // Oct 2013

    Cloud Computing Security and Encryption

    Cloud computing has been the talk of the town in the recent years. It has been suggested to everyone to store their data on a cloud. This has led to the birth of a new domain of research. As the cloud technology improves over time, so does the security threats....

    Provided By Anna University

  • White Papers // Sep 2013

    Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

    In this paper, the authors propose an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to...

    Provided By Anna University

  • White Papers // Sep 2013

    Distributed Heterogeneous Data Management in Grid Computing

    Ensembles of distributed, heterogeneous resources, or computational grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. Grid computing raises challenging issues in many areas of computer science, bioinformatics, high energy physics and especially in the...

    Provided By Anna University

  • White Papers // Sep 2013

    S-Spray Routing Protocol for Intermittently Connected Mobile Networks

    The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. The intermittent connectivity is due to the dense nature of the network. The dense nature is mainly due to the high mobility of the nodes in the network. Routing in such a sparse...

    Provided By Anna University

  • White Papers // Aug 2013

    Data Storage Security in Cloud Using Metadata

    In cloud era as the data stored is away from the user, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient method for providing security to the data stored at the data server through metadata. This method provides security using cipher key...

    Provided By Anna University

  • White Papers // Aug 2013

    Attribute Based Secure Data Access in Cloud Computing

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Attribute based secure data access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the...

    Provided By Anna University

  • White Papers // Aug 2013

    Monitoring the User Navigation in the Cloud Application

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By Anna University

  • White Papers // Jul 2013

    Implementation Strategies for Biometric Fingerprint Authentication for E-Governance Application

    E-Governance applications and services are secured using the key factor called Authentication. Most commonly used credentials for authentication and authorization are user name and password which is not sufficient for security. As Internet is more vulnerable nowadays, one factor authentication alone is not secure and it is more vulnerable for...

    Provided By Anna University

  • White Papers // May 2013

    A Study of Routing Techniques in Intermittently Connected MANETs

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three...

    Provided By Anna University

  • White Papers // May 2013

    Third Party Administration Based Security Mechanism for Trusted Ad Hoc Network

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographical location which also increases security problem. There are number of attacks due to lack of trust in wireless network, the idea of enforcing application centric network policy for MANETs from link...

    Provided By Anna University

  • White Papers // May 2013

    Forward Error Correction Code for MIMO-OFDM System in AWGN and Rayleigh Fading Channel

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration....

    Provided By Anna University

  • White Papers // May 2013

    A Security Gateway for Message Exchange in Services by Streaming and Validation

    Cloud Computing is found to be today's most commonly used Service Oriented Architecture (SOA) implementation. Cloud services are exposed as Web Services which follow the industry standards such as WSDL for service description, SOAP for enabling request and response and so on. Hence Web services security is of particular importance...

    Provided By Anna University

  • White Papers // May 2013

    An Efficient Approach for Effectual Mining of Relational Patterns from Multi-Relational Database

    Data mining is an extremely challenging and hopeful research topic due to its well-built application potential and the broad accessibility of the massive quantities of data in databases. Still, the rising significance of data mining in practical real world necessitates ever more complicated solutions while data includes of a huge...

    Provided By Anna University

  • White Papers // Apr 2013

    Byzantine Fault Tolerance Based Security Challenges for The Privacy Preserving Public Cloud

    Cloud computing make it possible to store large amounts of data. To monitoring User an entity whose data to be stores in the cloud and relies on the cloud for data storage and computation, server is an entity which manages by cloud service provider to provide data storage service and...

    Provided By Anna University

  • White Papers // Mar 2013

    A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network

    Design of reliable Wireless Sensor Network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues and requirements of reliability improvement mechanism depend on the available resources and application for which the WSN...

    Provided By Anna University

  • White Papers // Mar 2013

    Encrypted Data Storage in Cloud Environment

    Cloud Computing is the use of computing resources that are deliverable as a service over a network. Cloud computing relies on sharing of resources to achieve coherence. The cloud server may leak data information due to unauthorized entities or even be hacked. Encrypted storage and retrieval model is used. Searchable...

    Provided By Anna University

  • White Papers // Mar 2013

    An Energy Efficient Analysis of S-Mac and H-Mac Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is an interesting topic to the researchers because of its various applications. The applications are health monitoring and environmental monitoring, Industrial Process Monitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and Military Security Systems. The wireless medium requires highly optimized medium Access Protocols to avoid...

    Provided By Anna University

  • White Papers // Mar 2013

    Modified Optimal Performance Mapping on Reconfigurable Architecture for Multimedia Applications

    In this paper, Coarse-Grained Reconfigurable Architectures (CGRAs) are capable of achieving both goals of high performance and flexibility. CGRAs not only improve performance by exploiting the features of repetitive computations, but also can adapt to diverse computations by dynamically changing configurations of an array of its internal Processing Elements (PEs)...

    Provided By Anna University

  • White Papers // Mar 2013

    Error Correction for a Secure Multicast Group Key Management Using Gray Code

    Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes...

    Provided By Anna University

  • White Papers // Mar 2013

    Security System Based on Viola Jones Detection

    Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module)....

    Provided By Anna University

  • White Papers // Feb 2013

    Information Retrieval Based on Semantic Matching Approach in Web Service Discovery

    Information retrieval from web has been a tough task due to an increased amount of contents dynamically day by day. In that current information retrieval results are only based on syntactic description for web service which may not provide an accurate solution for all service requests. On the other hand...

    Provided By Anna University

  • White Papers // Feb 2013

    An Unsupervised Model to detect Web Spam Based on Qualified Link Analysis and Language Models

    With the massive use of the internet and the search engines, a major problem that comes to light is the Web Spam. Web spam can be detected by analyzing the various features of web pages and categorizing them as belonging to the spam or non-spam category. The proposed work considers...

    Provided By Anna University

  • White Papers // Jan 2013

    Securing and Managing the Data With Efficient Architecture in Cloud Computing Environment

    Cloud computing technology and services has become an important issue in the recent years. Cloud Computing needs lot of attention, time and innovative concepts for the technology to mature over a period of time. Many organizations show interest in adopting cloud computing technology and services because of its socio economic...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Jan 2013

    Towards Fault Handling in B2B Collaboration Using Orchestration Based Web Services Composition

    Recently, Web Services Composition is receiving significant amount of interest as an important strategy to allow Business-to-Business collaboration. The current Web Services composition solutions are inherently unreliable, so how to deliver reliable Web Services composition over unreliable web services is a significant and challenging problem. In this paper, the authors...

    Provided By Anna University

  • White Papers // Jan 2013

    Maximization of Lifetime and Reducing Power Consumption in Wireless Sensor Network Using Protocol

    This paper is to avoid duplicate transmission, node reconfiguration and power consumption in Wireless Sensor Networks (WSN). Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by...

    Provided By Anna University

  • White Papers // Nov 2012

    A Mobile Payment System Through Independent M-Signature Service

    Nowadays a great number of applications require the use of Electronic Signature (e-signature) and non-repudiation services such as certified e-mail, contract signing, electronic payment system and etc... The authenticity and integrity generated by e-signature in electronic document is like a handwritten signature in the paper document. The mobile user would...

    Provided By Anna University

  • White Papers // Nov 2012

    Security Implications of Distributed Database Management System Models

    Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and Multilevel Access Controls (MAC), protection and integrity maintenance. While determining which distributed database replica will...

    Provided By Anna University

  • White Papers // Nov 2012

    Non Linear Optimum Filtering and Smoothing Based IMM in GPS Navigation

    The information from Global Positioning System (GPS) has been increasingly used in many applications. Navigation is one of the important applications. To estimate the state of the vehicle, Kalman Filter (KF) is used traditionally. Since KF gives inaccurate results during non linear motion of the vehicle, an Unscented Kalman Filter...

    Provided By Anna University

  • White Papers // Nov 2012

    A Secure Key Transfer Protocol for Group Communication

    Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols...

    Provided By Anna University

  • White Papers // Nov 2012

    Energy Reduction Routing In Wireless Ad-Hoc Network

    Ad hoc networks are dynamically created and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any type of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The main objective...

    Provided By Anna University

  • White Papers // Oct 2012

    PKI Based Signcryption without Pairing: An Efficient Scheme with Tight Security Reduction

    Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, the authors address the question whether it is feasible to construct a PKI based signcryption...

    Provided By Anna University

  • White Papers // Oct 2012

    Multilayer Image Watermarking Scheme for Providing High Security

    The main theme of this application is to provide an algorithm color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the...

    Provided By Anna University

  • White Papers // Oct 2012

    A New Optimal Reverse Reactive Routing Protocol for the Shortest Route in Ad Hoc Networks

    In this paper, the authors propose a mechanism in which power consumption in a sensor network can be reduced greatly by taking into account the fairness factors and to increase the probability of nodes for successful packet transmission with lowest possible Signal to Noise Ratio (SNR) in a crowded environment....

    Provided By Anna University

  • White Papers // Jun 2009

    An Efficient Foreground Detection Algorithm for Visual Surveillance System

    This paper proposes an efficient foreground detection algorithm based on a new color space model and morphological filtering. This model uses each pixel's color distortion and brightness distortion to detect the candidate foreground pixels. The color distortion considers the vector's position in color space so that it can assemble the...

    Provided By Anna University

  • White Papers // Nov 2009

    Experimental Analysis of Receiver Performance of Optical CDMA System Using DPSK and OOK Modulation Through Balanced Detection and Optical Thresholding Techniques

    This paper is the performance of Optical Code Division Multiple Access (OCDMA) system is studied using Differential Phase Shift Keying (DPSK) with Balanced Detection (BD) and optical thresholding. For the OCDMA- DPSK receiver, the performance parameters bit error rate (BER), receiver sensitivity and spectral efficiency for asynchronous multiple access network...

    Provided By Anna University

  • White Papers // May 2010

    Contention Based Routing in Mobile Ad Hoc Networks with Multiple Copies

    Routing the packets efficiently in mobile ad hoc network does not have end to end paths. Multiple copies are forwarded from the source to the destination. To deal with such networks, researches introduced flooding based routing schemes which leads to high probability of delivery. But the flooding based routing schemes...

    Provided By Anna University

  • White Papers // Jan 2010

    Optimized Associativity-Based Threshold Routing for Mobile AdHoc Networks

    This paper proposes an Optimized Associativity-Based Threshold Routing (OABTR) protocol for ad hoc mobile networks with excessive traffic. An Associativity-based routing scheme is implemented, wherein a route is selected based on nodes having associativity-states that imply periods of spatial, temporal, connection and signal stability. The routes are selected based on...

    Provided By Anna University

  • White Papers // Oct 2010

    A Survey on QoS Based Routing Protocols for MANET

    In Mobile Ad hoc NETworks (MANETs), the provision of Quality of Service (QoS) guarantees is much more challenging mainly due to node mobility and resource constraints. Therefore it is important that routing protocols incorporate QoS metrics in route finding and maintenance to support end-to-end QoS. The traditional AODV protocol seems...

    Provided By Anna University

  • White Papers // Oct 2009

    Performance Evaluation and Comparison of on Demand Multicast Reactive Routing Protocols Under Black Hole Attack in MANET

    One main challenge in the design of routing protocols is their vulnerability to security attacks. This is mainly due to the wireless and dynamic nature of ad hoc networks. A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. In...

    Provided By Anna University

  • White Papers // Jan 2010

    Reliable Mining of Automatically Generated Test Cases From Software Requirements Specification (SRS)

    Writing requirements is a two-way process. This paper uses to classify Functional Requirements (FR) and Non Functional Requirements (NFR) statements from Software Requirements Specification (SRS) documents. This is systematically transformed into state charts considering all relevant information. The current paper outlines how test cases can be automatically generated from these...

    Provided By Anna University

  • White Papers // Oct 2010

    Congestion Aware and Adaptive Dynamic Source Routing Algorithm With Load-Balancing in MANETs

    The explosive growth in the use of real-time multimedia applications in mobile devices requires Quality of Service (QoS) support for effective communication. Network congestion is the main reason for packet loss, longer delay and jitter in streaming multimedia applications. Most of the present routing protocols are not designed to adapt...

    Provided By Anna University

  • White Papers // Dec 2010

    Analysis of Various Service Discovery Protocols for Infrastructure-Less Networks

    Globe is looking forward to new technologies that allow them to communicate anytime, anywhere, and using any communication device. This is possible by infrastructure-less wireless networks in which nodes can communicate directly to each other (without a central coordinator) and can relay data to each other in a self-organizing fashion.....

    Provided By Anna University

  • White Papers // Jul 2010

    A High Certificate Authority Scheme for Authentication in Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. Trust based cross layer approach established a network consisting confidentiality and authentication of packets in both routing and link layers., in this paper, the authors propose...

    Provided By Anna University

  • White Papers // Oct 2009

    Data Preprocessing and Easy Access Retrieval of Data Through Data Ware House

    The World Wide Web (WWW) provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web Usage Mining is the application of data mining techniques to click stream data in order to extract usage patterns. These patterns are analyzed to determine user's behavior...

    Provided By Anna University

  • White Papers // Nov 2010

    Parametric Analysis of Mobile Ad-Hoc Network Environment

    A mobile Ad-Hoc Network (MANET) is a collection of wireless nodes that communicate with each other without any infrastructure. Present day mobile ad hoc networks grow in size and the associated complexity warrant the need to explore the suitability of the various simulation parameters during their execution. This paper presents...

    Provided By Anna University

  • White Papers // Oct 2009

    Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography

    The Elliptic Curve Cryptosystem (ECC) is an emerging alternative for traditional Public-Key Cryptosystem like RSA, DSA and DH. It provides the highest strength-per-bit of any cryptosystem known today with smaller key sizes resulting in faster computations, lower power consumption and memory. It also provides a methodology for obtaining high-speed, efficient...

    Provided By Anna University

  • White Papers // Jan 2010

    Reducing Packet Delay and Loss in Heterogeneous Mobile Wireless Networks

    Efficient communications are crucial for disaster response and recovery. However, most current public safety Land Mobile Radio (LMR) networks only provide narrowband voice service with limited support of low-speed data services due to the packet delay and loss and less resource utilization. So high resource utilization techniques are needed. The...

    Provided By Anna University

  • White Papers // Dec 2014

    Low Power FSK Modulation and Demodulation Using VHDL

    Frequency Shift Keying (FSK) is the most common form of digital modulation in the high-frequency radio spectrum, and has important applications in telephone circuits. Binary FSK (usually referred to simply as FSK) is a modulation scheme typically used to digital information between digital equipment such as tele printers and computers....

    Provided By Anna University

  • White Papers // Mar 2010

    Throughput Enhancement in Scalable MANETs Using Proactive and Reactive Routing Protocols

    In MANET routing is an essential activity that connects a call from source to destination in telecommunication networks and also need to be essential in architecture, design and operation of networks. Routing with Scalable performance is one of the key challenges in deploying large scale Mobile Ad hoc Networks. In...

    Provided By Anna University

  • White Papers // Jun 2010

    Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol

    In this paper, the authors develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, they design a trust based packet forwarding scheme for detecting and isolating...

    Provided By Anna University

  • White Papers // Sep 2009

    Throughput and Delay Comparison of MANET Routing Protocols

    Mobile wireless ad hoc networks are infrastructureless and often used to operate under unattended mode. So, it is significant in bringing out a comparison of the various routing protocols for better understanding and implementation of them. In this paper, the authors studied and compared the performance of various routing protocols...

    Provided By Anna University

  • White Papers // Jul 2012

    Based on Pause Time Comparative Analysis Made Among Bee-Ant Colony Optimized Routing (BACOR) Vs Existing Routing Protocols for Scalable Mobile Ad Hoc Networks (MANETs)

    In this paper based on swarm intelligence a new approach for an on demand ad-hoc routing algorithm is proposed. The foraging behavior of Ant colony optimization and Bee colony optimization, which are the subset of swarm intelligence and considering the ability of simple ants to solve complex problems by cooperation....

    Provided By Anna University

  • White Papers // May 2011

    Detection of Colluding Selective Forwarding Nodes in Wireless Mesh Networks Based on Channel Aware Detection Algorithm

    In this paper, the authors consider selective forwarding attacks in Wireless Mesh Networks (WMNs) when malicious nodes act in collusion. The malicious nodes together create forged packets to attack and selectively drop, route or inspect network traffic. This type of selective forwarding is very difficult to defend against. The attacks...

    Provided By Anna University

  • White Papers // Jun 2012

    Impact of Sinking Behavior in Mobile Adhoc Network

    Mobile ad hoc networks suffer for lack of security because of its mobility of the nodes and the network is vulnerable to most of the intrusion behaviour. In this paper, the authors analyze one of the most vulnerable behaviours known as Sinkhole behaviour. They designed architecture to effectively analyze this...

    Provided By Anna University

  • White Papers // Jul 2012

    Power Efficient Dynamic MAC Protocol (D-MAC) for Wireless Sensor Networks

    In the wireless sensor network there are several patterns of data forwarding interruption problems from the source to sink nodes in multi-hop path. In this paper, the authors propose a Dynamic MAC (D-MAC), energy efficient and low latency MAC for data gathering in wireless sensor networks. DMAC is designed to...

    Provided By Anna University

  • White Papers // Jul 2011

    Delay Tolerant Cluster Based Routing for Wireless Sensor Networks

    In a dynamic Wireless Sensor Network (WSN) the movement of each sensor node affects the structure of network which may result in inefficient routing. Various difficulties in a dynamic network may include lack of communication between the nodes, end to end delay and transmission overhead. Transmitting data in a dynamic...

    Provided By Anna University

  • White Papers // Jun 2012

    A Novel Energy Efficient Surface Water Wireless Sensor Network Algorithm

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. It has been a challenge to design wireless sensor networks to enable applications for oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications. WSN consists of sensor nodes which...

    Provided By Anna University

  • White Papers // Oct 2012

    Multilayer Image Watermarking Scheme for Providing High Security

    The main theme of this application is to provide an algorithm color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the...

    Provided By Anna University

  • White Papers // Aug 2012

    A Novel Mechanism for Interconnection Between Peripherals in SOC'S Using CDMA Technique

    NOC (Network On Chip) is an efficient approach to design the communication subsystem between IP Cores in SOC (System On Chip). In this paper a communication infrastructure design using CDMA (Code division multiple access) based shared bus architecture for core-to-core communication in NoC is presented. CDMA has been proposed as...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Aug 2012

    CDRA: Consistency Based Data Replication Algorithm for MANET

    Mobile Ad hoc NETwork (MANET) consists of mobile nodes which are connected without any centralized administration. The main popularity of MANET is to ensure that lack of infrastructure, self organization and no access point. Mobile nodes are sharing their data whenever and wherever it's needed. To maintain the effective data...

    Provided By Anna University

  • White Papers // Jul 2012

    Automated Software Performance Improvement: Best Practices for Evaluation

    Automated software has different dynamic behavior during use when compared to general software application. Mostly these dynamic characteristics degrade the application performance during operation due to lack of understanding of performance requirement during testing. Misunderstanding on requirement for testing by the test engineer lead to loss of reputation, financial and...

    Provided By Anna University

  • White Papers // Jul 2012

    Intrusion Detection System Designed for Wireless Using JADE Mobile Agent Framework

    In wireless environment the system allows the end users to use the application without installation and access their personal files at any computer with internet access. Apart from the advantages of wireless network, security is the major issue. Due to the distributed nature, wireless environment is an easy target for...

    Provided By Anna University

  • White Papers // Jun 2012

    An Energy Based Data Gathering Approach for Wireless Sensor Networks

    In Wireless Sensor Networks (WSNs), sensor nodes are organized in a random manner. These sensor nodes are mainly deployed in physical environment to gather data and deliver the data to the destination wherever requires. Sensor nodes have limited computational capability, limited bandwidth, energy source and memory. The main challenge in...

    Provided By Anna University

  • White Papers // Mar 2010

    Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side

    Cross Site Scripting (XSS) Flaws are currently the most popular security problems in modern web applications. These Flaws make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. Cross-site scripting Flaws occur when accessing information in intermediate...

    Provided By Anna University

  • White Papers // Mar 2013

    Security System Based on Viola Jones Detection

    Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module)....

    Provided By Anna University

  • White Papers // Mar 2013

    Error Correction for a Secure Multicast Group Key Management Using Gray Code

    Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes...

    Provided By Anna University

  • White Papers // Oct 2012

    PKI Based Signcryption without Pairing: An Efficient Scheme with Tight Security Reduction

    Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, the authors address the question whether it is feasible to construct a PKI based signcryption...

    Provided By Anna University

  • White Papers // Jun 2012

    ARRP: Azimuth Restricted Routing Protocol for Ad Hoc Networks

    Ad Hoc Networks consists of set of mobile nodes forming spontaneous network. There is a need for an efficient routing protocol for Ad Hoc networks over the years. Bandwidth utilization and node power consumption are two important factors in wireless transmissions. This paper presents simulation model of new routing protocol...

    Provided By Anna University

  • White Papers // Jun 2012

    Topology Management Based Energy Balancing Model for IPS in MANET Using MEC Clustering Algorithm

    In Mobile Ad-hoc Networks, the topology management is a crucial factor that plays a vital role to maintain the node cooperation and stability of the network in unpredicted movements of the nodes. Moreover, the resource consumption imposes problem with mobile nodes due to the variations of resource availability. The Intrusion...

    Provided By Anna University

  • White Papers // Jun 2012

    Efficient Source Routing Scheme for Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes without any centralized administration. These nodes collect the information through overhearing and store information in route caches through routing protocol. When the route cache freshness is absent, it leads to the stale route information resulting in pollution caches. If...

    Provided By Anna University

  • White Papers // Mar 2013

    Modified Optimal Performance Mapping on Reconfigurable Architecture for Multimedia Applications

    In this paper, Coarse-Grained Reconfigurable Architectures (CGRAs) are capable of achieving both goals of high performance and flexibility. CGRAs not only improve performance by exploiting the features of repetitive computations, but also can adapt to diverse computations by dynamically changing configurations of an array of its internal Processing Elements (PEs)...

    Provided By Anna University

  • White Papers // Sep 2012

    L Diversity on K-Anonymity With External Database for Improving Privacy Preserving Data Publishing

    The data must be secure and measurable at the public when it releases to view. The data table produces personal information and sensitive values. They are maintained for secrecy, the anonymity is the best method to protect the data. There are many anonymity methods to protect the data. k -anonymity...

    Provided By Anna University