Anna University

Displaying 1-40 of 211 results

  • White Papers // May 2014

    Mining Search Log for Privacy Definitions and Phish Safe

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. Some commonly used black hat techniques has been characterized and proposed a new way to counter...

    Provided By Anna University

  • White Papers // Apr 2014

    Detect SQLI Attacks in Web Apps Using NVS

    Now-a-days the world of information era, the authors can get information just their single click by using web application. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. It are playing a...

    Provided By Anna University

  • White Papers // Dec 2013

    Effective Ant Based Routing Algorithm for Data Replication in Manets

    In mobile ad hoc network, the nodes often move and keep on change its topology. Data packets can be forwarded from one node to another on demand. To increase the data accessibility data are replicated at nodes and made as sharable to other nodes. Assuming that all mobile host cooperative...

    Provided By Anna University

  • White Papers // Nov 2013

    Optimization of Vertical Links in a Three-Dimensional NOC Based Multicore Crypto Processor for Cloud Computing

    The popularity of multiprocessors over the last few years has been made possible by Network-on-Chip (NoC). The advent of Three-Dimensional Network-on-Chip (3D NoC) has facilitated the communication in Three-Dimensional Integrated Circuits (3D IC). However, the implementation of 3D NoC is a vital issue with the fabrication of Through-Silicon-Via (TSV), due...

    Provided By Anna University

  • White Papers // Oct 2013

    Cloud Computing Security and Encryption

    Cloud computing has been the talk of the town in the recent years. It has been suggested to everyone to store their data on a cloud. This has led to the birth of a new domain of research. As the cloud technology improves over time, so does the security threats....

    Provided By Anna University

  • White Papers // Sep 2013

    S-Spray Routing Protocol for Intermittently Connected Mobile Networks

    The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. The intermittent connectivity is due to the dense nature of the network. The dense nature is mainly due to the high mobility of the nodes in the network. Routing in such a sparse...

    Provided By Anna University

  • White Papers // Sep 2013

    Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

    In this paper, the authors propose an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to...

    Provided By Anna University

  • White Papers // Sep 2013

    Distributed Heterogeneous Data Management in Grid Computing

    Ensembles of distributed, heterogeneous resources, or computational grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. Grid computing raises challenging issues in many areas of computer science, bioinformatics, high energy physics and especially in the...

    Provided By Anna University

  • White Papers // Aug 2013

    Data Storage Security in Cloud Using Metadata

    In cloud era as the data stored is away from the user, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient method for providing security to the data stored at the data server through metadata. This method provides security using cipher key...

    Provided By Anna University

  • White Papers // Aug 2013

    Monitoring the User Navigation in the Cloud Application

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By Anna University

  • White Papers // Aug 2013

    Attribute Based Secure Data Access in Cloud Computing

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Attribute based secure data access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the...

    Provided By Anna University

  • White Papers // Jul 2013

    Implementation Strategies for Biometric Fingerprint Authentication for E-Governance Application

    E-Governance applications and services are secured using the key factor called Authentication. Most commonly used credentials for authentication and authorization are user name and password which is not sufficient for security. As Internet is more vulnerable nowadays, one factor authentication alone is not secure and it is more vulnerable for...

    Provided By Anna University

  • White Papers // May 2013

    A Study of Routing Techniques in Intermittently Connected MANETs

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three...

    Provided By Anna University

  • White Papers // May 2013

    Third Party Administration Based Security Mechanism for Trusted Ad Hoc Network

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographical location which also increases security problem. There are number of attacks due to lack of trust in wireless network, the idea of enforcing application centric network policy for MANETs from link...

    Provided By Anna University

  • White Papers // May 2013

    Forward Error Correction Code for MIMO-OFDM System in AWGN and Rayleigh Fading Channel

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration....

    Provided By Anna University

  • White Papers // May 2013

    An Efficient Approach for Effectual Mining of Relational Patterns from Multi-Relational Database

    Data mining is an extremely challenging and hopeful research topic due to its well-built application potential and the broad accessibility of the massive quantities of data in databases. Still, the rising significance of data mining in practical real world necessitates ever more complicated solutions while data includes of a huge...

    Provided By Anna University

  • White Papers // May 2013

    A Security Gateway for Message Exchange in Services by Streaming and Validation

    Cloud Computing is found to be today's most commonly used Service Oriented Architecture (SOA) implementation. Cloud services are exposed as Web Services which follow the industry standards such as WSDL for service description, SOAP for enabling request and response and so on. Hence Web services security is of particular importance...

    Provided By Anna University

  • White Papers // Apr 2013

    Byzantine Fault Tolerance Based Security Challenges for The Privacy Preserving Public Cloud

    Cloud computing make it possible to store large amounts of data. To monitoring User an entity whose data to be stores in the cloud and relies on the cloud for data storage and computation, server is an entity which manages by cloud service provider to provide data storage service and...

    Provided By Anna University

  • White Papers // Mar 2013

    Error Correction for a Secure Multicast Group Key Management Using Gray Code

    Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes...

    Provided By Anna University

  • White Papers // Mar 2013

    Security System Based on Viola Jones Detection

    Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module)....

    Provided By Anna University

  • White Papers // Mar 2013

    Modified Optimal Performance Mapping on Reconfigurable Architecture for Multimedia Applications

    In this paper, Coarse-Grained Reconfigurable Architectures (CGRAs) are capable of achieving both goals of high performance and flexibility. CGRAs not only improve performance by exploiting the features of repetitive computations, but also can adapt to diverse computations by dynamically changing configurations of an array of its internal Processing Elements (PEs)...

    Provided By Anna University

  • White Papers // Mar 2013

    An Energy Efficient Analysis of S-Mac and H-Mac Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is an interesting topic to the researchers because of its various applications. The applications are health monitoring and environmental monitoring, Industrial Process Monitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and Military Security Systems. The wireless medium requires highly optimized medium Access Protocols to avoid...

    Provided By Anna University

  • White Papers // Mar 2013

    A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network

    Design of reliable Wireless Sensor Network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues and requirements of reliability improvement mechanism depend on the available resources and application for which the WSN...

    Provided By Anna University

  • White Papers // Mar 2013

    Encrypted Data Storage in Cloud Environment

    Cloud Computing is the use of computing resources that are deliverable as a service over a network. Cloud computing relies on sharing of resources to achieve coherence. The cloud server may leak data information due to unauthorized entities or even be hacked. Encrypted storage and retrieval model is used. Searchable...

    Provided By Anna University

  • White Papers // Feb 2013

    Information Retrieval Based on Semantic Matching Approach in Web Service Discovery

    Information retrieval from web has been a tough task due to an increased amount of contents dynamically day by day. In that current information retrieval results are only based on syntactic description for web service which may not provide an accurate solution for all service requests. On the other hand...

    Provided By Anna University

  • White Papers // Feb 2013

    An Unsupervised Model to detect Web Spam Based on Qualified Link Analysis and Language Models

    With the massive use of the internet and the search engines, a major problem that comes to light is the Web Spam. Web spam can be detected by analyzing the various features of web pages and categorizing them as belonging to the spam or non-spam category. The proposed work considers...

    Provided By Anna University

  • White Papers // Jan 2013

    Securing and Managing the Data With Efficient Architecture in Cloud Computing Environment

    Cloud computing technology and services has become an important issue in the recent years. Cloud Computing needs lot of attention, time and innovative concepts for the technology to mature over a period of time. Many organizations show interest in adopting cloud computing technology and services because of its socio economic...

    Provided By Anna University

  • White Papers // Jan 2013

    Maximization of Lifetime and Reducing Power Consumption in Wireless Sensor Network Using Protocol

    This paper is to avoid duplicate transmission, node reconfiguration and power consumption in Wireless Sensor Networks (WSN). Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Jan 2013

    Towards Fault Handling in B2B Collaboration Using Orchestration Based Web Services Composition

    Recently, Web Services Composition is receiving significant amount of interest as an important strategy to allow Business-to-Business collaboration. The current Web Services composition solutions are inherently unreliable, so how to deliver reliable Web Services composition over unreliable web services is a significant and challenging problem. In this paper, the authors...

    Provided By Anna University

  • White Papers // Nov 2012

    A Mobile Payment System Through Independent M-Signature Service

    Nowadays a great number of applications require the use of Electronic Signature (e-signature) and non-repudiation services such as certified e-mail, contract signing, electronic payment system and etc... The authenticity and integrity generated by e-signature in electronic document is like a handwritten signature in the paper document. The mobile user would...

    Provided By Anna University

  • White Papers // Nov 2012

    Security Implications of Distributed Database Management System Models

    Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and Multilevel Access Controls (MAC), protection and integrity maintenance. While determining which distributed database replica will...

    Provided By Anna University

  • White Papers // Nov 2012

    Non Linear Optimum Filtering and Smoothing Based IMM in GPS Navigation

    The information from Global Positioning System (GPS) has been increasingly used in many applications. Navigation is one of the important applications. To estimate the state of the vehicle, Kalman Filter (KF) is used traditionally. Since KF gives inaccurate results during non linear motion of the vehicle, an Unscented Kalman Filter...

    Provided By Anna University

  • White Papers // Nov 2012

    A Secure Key Transfer Protocol for Group Communication

    Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols...

    Provided By Anna University

  • White Papers // Nov 2012

    Energy Reduction Routing In Wireless Ad-Hoc Network

    Ad hoc networks are dynamically created and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any type of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The main objective...

    Provided By Anna University

  • White Papers // Oct 2012

    PKI Based Signcryption without Pairing: An Efficient Scheme with Tight Security Reduction

    Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, the authors address the question whether it is feasible to construct a PKI based signcryption...

    Provided By Anna University

  • White Papers // Oct 2012

    Multilayer Image Watermarking Scheme for Providing High Security

    The main theme of this application is to provide an algorithm color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the...

    Provided By Anna University

  • White Papers // Oct 2012

    A New Optimal Reverse Reactive Routing Protocol for the Shortest Route in Ad Hoc Networks

    In this paper, the authors propose a mechanism in which power consumption in a sensor network can be reduced greatly by taking into account the fairness factors and to increase the probability of nodes for successful packet transmission with lowest possible Signal to Noise Ratio (SNR) in a crowded environment....

    Provided By Anna University

  • White Papers // Sep 2012

    L Diversity on K-Anonymity With External Database for Improving Privacy Preserving Data Publishing

    The data must be secure and measurable at the public when it releases to view. The data table produces personal information and sensitive values. They are maintained for secrecy, the anonymity is the best method to protect the data. There are many anonymity methods to protect the data. k -anonymity...

    Provided By Anna University

  • White Papers // Sep 2012

    A QoS Towards Dynamic Web Services Recapitulation and Selection

    Web services are the components, communicates via Internet or Web. Fundamental vision of the Web service is a brokerage system. The Recapitulation of Web service is an approach for the effective integration of distributed, heterogeneous and autonomous applications to build more Structured and value added services. Web services selection algorithms...

    Provided By Anna University

  • White Papers // Jan 2010

    Design of MEMS Components for All-Optical Code Based Router

    A novel code based all-optical router using MEMS components is presented in this paper. The proposed architecture of the router is given. The router is configured using MEMS optical filters, MEMS optical switches, circulators and combiners. In this paper, simulation is carried out for MEMS optical filters and optical switches...

    Provided By Anna University

  • White Papers // Jul 2012

    Handoff Mobiles with Low Latency in Heterogeneous Networks for Seamless Mobility: A Survey and Future Directions

    As the number of mobiles and mobile networks increases every year, the authors are facing new problems and challenges in incorporate various networks with various standards and technologies. In that the problem of handoff is a big parameter which affects the performance dramatically. Many ideas and schemes for handoff mobiles...

    Provided By Anna University

  • White Papers // Apr 2012

    Cloudpress 2.0: A MapReduce Approach for News Retrieval on the Cloud

    In this era of the Internet, the amount of news articles added every minute of every day is humongous. As a result of this explosive amount of news articles, news retrieval systems are required to process the news articles frequently and intensively. The news retrieval systems that are in-use today...

    Provided By Anna University

  • White Papers // Nov 2012

    A Secure Key Transfer Protocol for Group Communication

    Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols...

    Provided By Anna University

  • White Papers // Mar 2010

    Throughput Enhancement in Scalable MANETs Using Proactive and Reactive Routing Protocols

    In MANET routing is an essential activity that connects a call from source to destination in telecommunication networks and also need to be essential in architecture, design and operation of networks. Routing with Scalable performance is one of the key challenges in deploying large scale Mobile Ad hoc Networks. In...

    Provided By Anna University

  • White Papers // Sep 2009

    Throughput and Delay Comparison of MANET Routing Protocols

    Mobile wireless ad hoc networks are infrastructureless and often used to operate under unattended mode. So, it is significant in bringing out a comparison of the various routing protocols for better understanding and implementation of them. In this paper, the authors studied and compared the performance of various routing protocols...

    Provided By Anna University

  • White Papers // Jun 2010

    Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol

    In this paper, the authors develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, they design a trust based packet forwarding scheme for detecting and isolating...

    Provided By Anna University

  • White Papers // Jul 2011

    RTOS Based Secure Shortest Path Routing Algorithm in Mobile Ad-Hoc Networks

    Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security...

    Provided By Anna University

  • White Papers // Feb 2010

    A Frame Aggregation Scheduler for IEEE 802.11n

    Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standard are widely deployed in the home and enterprise segments across the globe. The IEEE 802.11n is the latest amendment that aims to achieve throughput higher than 100 Mbps at the Medium Access Control (MAC) layer. It defines two frame...

    Provided By Anna University

  • White Papers // Apr 2011

    W-Meter : An Open-Source WLAN Product Evaluation Framework

    Wireless LAN products based on the IEEE 802.11 standards are very popular across home and enterprise markets globally. The certification programmed conducted by the Wi-Fi alliance is expensive and focuses on the interoperability issues. It also uses proprietary tools for accomplishing the same. In this paper, the authors propose a...

    Provided By Anna University

  • White Papers // May 2010

    Analysis of Open Source Drivers for IEEE 802.11 WLANs

    The purpose of this paper is to analyze the open source IEEE 802.11 Wireless Local Area Network (WLAN) stack implementation for further enhancement and implementations. The authors discuss the IEEE 802.11 WLAN implementation in the latest Linux kernel. This includes a functional breakdown of the driver and the overall flow...

    Provided By Anna University

  • White Papers // Apr 2010

    An Adaptive Time Slot Allocation for Statistical QoS Guarantees in Wireless Networks Using Crosslayer Approach

    Quality of Service (QoS) guarantees plays a critically important role in mobile wireless networks. For the real time services like multimedia video conference, the key QoS metric is to ensure a stringent delay-bound rather than high spectral efficiency. In this paper, a cross-layer approach is proposed to investigate the impact...

    Provided By Anna University

  • White Papers // Jul 2011

    A Time Index Based Approach for Cache Sharing in Mobile Adhoc Networks

    Initially wireless networks were fully infrastructure based and hence imposed the necessity to install base station. Base station leads to single point of failure and causes scalability problems. With the advent of mobile adhoc networks, these problems are mitigated, by allowing certain mobile nodes to form a dynamic and temporary...

    Provided By Anna University

  • White Papers // Sep 2011

    QoS With Reliability and Scalability in Adaptive Service-Based Systems

    Service-based systems that are dynamically composed at runtime to provide complex, adaptive functionality are currently one of the main development paradigms in software engineering. However, the Quality of Service (QoS) delivered by these systems remains an important concern, and needs to be managed in an equally adaptive and predictable way....

    Provided By Anna University

  • White Papers // Mar 2011

    Real Time Outlier Detection in Wireless Sensor Networks

    In the field of wireless sensor networks, the sensed patterns that significantly deviate from the normal patterns are considered as outliers. The possible sources of outliers include noise and errors, events, and malicious attacks on the network. Wireless Sensor Networks (WSNs) are more likely to generate outliers due to their...

    Provided By Anna University

  • White Papers // Dec 2011

    Implementation of Dynamic Coupling Measurement of Distributed Object Oriented Software Based on Trace Events

    Software metrics are increasingly playing a central role in the planning and control of software development projects. Coupling measures have important applications in software development and maintenance. Existing literature on software metrics is mainly focused on centralized systems, while work in the area of distributed systems, particularly in service-oriented systems,...

    Provided By Anna University

  • White Papers // Oct 2011

    Meta Search Engine With an Intelligent Interface for Information Retrieval on Multiple Domains

    This paper analyzes the features of Web Search Engines, Vertical Search Engines, Meta Search Engines, and proposes a Meta Search Engine for searching and retrieving documents on Multiple Domains in the World Wide Web (WWW). A web search engine searches for information in WWW. A Vertical Search provides the user...

    Provided By Anna University

  • White Papers // Sep 2011

    CNOA: Challenging Number Approach for Uncovering TCP SYN Flooding Using SYN Spoofing Attack

    The challenging number is used for the detection of Spoofing attack. The IP Spoofing is considered to be one of the potentially brutal attack which acts as a tool for the DDoS attack which is considered to be a major threat among security problems in today's internet. These kinds of...

    Provided By Anna University

  • White Papers // Sep 2011

    Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET

    Mobile Ad-hoc wireless NETworks (MANET) are a significant area of research with many applications. MANETs are more vulnerable to malicious attack. Authentication and encryption techniques can be used as the first line of defense for reducing the possibilities of attacks. Alternatively, these approaches have several demerits and designed for a...

    Provided By Anna University

  • White Papers // Sep 2011

    Error Detection and Correction for Distributed Group Key Agreement Protocol

    Integrating an efficient Error detection and correction scheme with less encoding and decoding complexity to support the distribution of keying material in a secure group communication is an important issue, since the amount of information carried out in the wireless channel is high which produces more errors due to noise...

    Provided By Anna University

  • White Papers // Jun 2011

    Data Aggregation and Privacy for Police Patrols

    With a widespread growth in the potential applications of Wireless Sensor Networks, the need for reliable security mechanisms for them has increased manifold. This paper proposes a scheme, Privacy for Police Patrols (PPP), to provide secure data aggregation that relies on multilevel routing. Privacy factors have been identified and implemented....

    Provided By Anna University

  • White Papers // Dec 2011

    A Dynamic Approach for Anomaly Detection in AODV

    Mobile Ad hoc NETworks (MANETs) are relatively vulnerable to malicious network attacks, and therefore, security is a more significant issue than infrastructure-based wire-less networks. In MANETs, it is difficult to identify malicious hosts as the topology of the network dynamically changes. A malicious host can easily interrupt a route for...

    Provided By Anna University

  • White Papers // Jul 2011

    A Recent Technique to Detect Sink Hole Attacks in WSN

    A Wireless Sensor Network (WSN) consists of large number of low cost low power sensor nodes. The nature of wireless sensor networks makes them very attractive to attackers. One of the most popular and serious attacks in wireless sensor networks is sink hole attack and most existing protocols to defend...

    Provided By Anna University

  • White Papers // Jul 2011

    An Overview of Security Problems in MANET

    Mobile Ad hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participating in the network acts both as host and a router and must therefore is willing...

    Provided By Anna University

  • White Papers // Oct 2011

    An Overview of Potential Vulnerabilities and Requirements of MANET

    In mobile ad-hoc networks, nodes do not rely on any routing infrastructure but relay packets for each other. Thus communication in mobile ad-hoc networks functions properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate, for example to...

    Provided By Anna University

  • White Papers // Jun 2011

    Partial Image Spam e-Mail Detection Using OCR

    Even though there a number of inbuilt e-mail filtering software associated with every e-mail service providers like Gmail, Yahoo mail they identify only text spam and image spam. As a result they could not detect the mix image spam. So this paper concentrates on identifying and avoiding partial image spam...

    Provided By Anna University

  • White Papers // Oct 2011

    An Efficient Passive Approach for Quality of Service Routing in MANETs

    The application of Mobile Ad hoc NETworks (MANETs) has been increasing everyday. Attractive features of MANETs are absence of infrastructure and decentralized nature. Routing protocols for mobile ad hoc networks have been explored extensively in recent years. Much of the work is aimed at finding a feasible route from a...

    Provided By Anna University

  • White Papers // Aug 2011

    A Robust and Efficient Real Time Network Intrusion Detection System Using Artificial Neural Network in Data Mining

    Today, intrusion detection is one of the major concern in the task of network administration and security. There is a need to safeguard the networks from known vulnerabilities and at the same time take steps to detect new and unseen, but possible, system abuses by developing more reliable and efficient...

    Provided By Anna University

  • White Papers // Dec 2008

    Improved Interference Diversity in Multicellular OFDMA Systems

    Orthogonal Frequency Division Multiple Access (OFDMA) is becoming a popular technology choice for leading next generation wireless networks. The IEEE 802.16e based systems are the first standardized wireless networks which have incorporated OFDMA. The authors investigate the use of interference diversity in IEEE 802.16e based networks by considering subchannel formation...

    Provided By Anna University

  • White Papers // May 2012

    Enhanced Location Based Routing Protocol for 6LoWPAN

    6LoWPAN (IPv6 over IEEE 802.15.4) standardized by IEEE 802.15.4 provides IP communication capability for nodes in WSN. An adaptation layer is introduced above the MAC layer to achieve header compression, fragmentation and reassembly of IP packets. The location-based information is used to simplify the routing policy. This paper proposes an...

    Provided By Anna University

  • White Papers // Jun 2012

    A Novel Energy Efficient Surface Water Wireless Sensor Network Algorithm

    Maintaining the energy of sensors in Wireless Sensor Network (WSN) is important in critical applications. It has been a challenge to design wireless sensor networks to enable applications for oceanographic data collection, pollution monitoring, offshore exploration, disaster prevention, assisted navigation and tactical surveillance applications. WSN consists of sensor nodes which...

    Provided By Anna University

  • White Papers // Jun 2012

    Impact of Sinking Behavior in Mobile Adhoc Network

    Mobile ad hoc networks suffer for lack of security because of its mobility of the nodes and the network is vulnerable to most of the intrusion behaviour. In this paper, the authors analyze one of the most vulnerable behaviours known as Sinkhole behaviour. They designed architecture to effectively analyze this...

    Provided By Anna University

  • White Papers // May 2011

    Detection of Colluding Selective Forwarding Nodes in Wireless Mesh Networks Based on Channel Aware Detection Algorithm

    In this paper, the authors consider selective forwarding attacks in Wireless Mesh Networks (WMNs) when malicious nodes act in collusion. The malicious nodes together create forged packets to attack and selectively drop, route or inspect network traffic. This type of selective forwarding is very difficult to defend against. The attacks...

    Provided By Anna University

  • White Papers // Jul 2012

    Power Efficient Dynamic MAC Protocol (D-MAC) for Wireless Sensor Networks

    In the wireless sensor network there are several patterns of data forwarding interruption problems from the source to sink nodes in multi-hop path. In this paper, the authors propose a Dynamic MAC (D-MAC), energy efficient and low latency MAC for data gathering in wireless sensor networks. DMAC is designed to...

    Provided By Anna University

  • White Papers // Nov 2008

    New Approaches to Routing Techniques of MANET Node for Optimal Network Performance

    Mobile Adhoc Network is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure. In wireless networks, routing is undoubtedly one of the most demanding areas where flexibility and cost are of significant importance. The aim of the current work is the study...

    Provided By Anna University

  • White Papers // Nov 2008

    Efficient Co-Scheduling of Parallel Jobs in Cluster Computing

    Co-scheduling of parallel jobs in the chips is well-known to produce benefits in both system and individual job efficiency. The existing works have shown that job co-scheduling can effectively improve the contention, yet the question on the determination of optimal co-schedules still remains unanswered. The need for co-scheduling has been...

    Provided By Anna University

  • White Papers // Oct 2008

    Load Balancing in Internet Using Adaptive Packet Scheduling and Bursty Traffic Splitting

    In this paper, the authors propose an architecture for load balancing, which contains an adaptive packet scheduler with a bursty traffic splitting algorithm. The scheduler has one classifier which classifies the flows into aggressive and normal flow. Aggressive flows are treated as high priority flows. Based on the buffer occupancy...

    Provided By Anna University

  • White Papers // Jul 2010

    A Double Min Min Algorithm for Task Metascheduler on Hypercubic P2P Grid Systems

    Most of the existing solutions on task scheduling and resource management in grid computing are based on the traditional client/ server model, enforcing a homogeneous policy on making decisions and limiting the flexibility, unpredictable reliability and scalability of the system. Thus, the authors need well organized system architecture to provide...

    Provided By Anna University

  • White Papers // Dec 2009

    Fault Injection Based Analysis of Defect Amplification Index in Technology Variant Commercial Software Application Development

    Fault injection involves the deliberate insertion of faults or errors into software in order to determine its response and to study its behaviour. Fault Injection Experiments have proven to be an effective method for measuring and studying response of defects, validating fault-tolerant systems, and observing how systems behave in the...

    Provided By Anna University

  • White Papers // Dec 2009

    Enhancing WLAN MAC Protocol Performance Using Differentiated VOIP and Data Services Strategy

    The application of Voice over-IP (VoIP) over WLANs has drawn a lot of attention from both industry and academia. Currently, the highly dense deployment of WLANs results in that the number of stations in a Basic Service Set (BSS) increases quickly, and thus the work on the capacity for VoIP...

    Provided By Anna University