Anna University

Displaying 1-40 of 220 results

  • White Papers // Dec 2013

    Effective Ant Based Routing Algorithm for Data Replication in Manets

    In mobile ad hoc network, the nodes often move and keep on change its topology. Data packets can be forwarded from one node to another on demand. To increase the data accessibility data are replicated at nodes and made as sharable to other nodes. Assuming that all mobile host cooperative...

    Provided By Anna University

  • White Papers // Nov 2013

    Optimization of Vertical Links in a Three-Dimensional NOC Based Multicore Crypto Processor for Cloud Computing

    The popularity of multiprocessors over the last few years has been made possible by Network-on-Chip (NoC). The advent of Three-Dimensional Network-on-Chip (3D NoC) has facilitated the communication in Three-Dimensional Integrated Circuits (3D IC). However, the implementation of 3D NoC is a vital issue with the fabrication of Through-Silicon-Via (TSV), due...

    Provided By Anna University

  • White Papers // Oct 2013

    Cloud Computing Security and Encryption

    Cloud computing has been the talk of the town in the recent years. It has been suggested to everyone to store their data on a cloud. This has led to the birth of a new domain of research. As the cloud technology improves over time, so does the security threats....

    Provided By Anna University

  • White Papers // Sep 2013

    Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

    In this paper, the authors propose an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to...

    Provided By Anna University

  • White Papers // Sep 2013

    Distributed Heterogeneous Data Management in Grid Computing

    Ensembles of distributed, heterogeneous resources, or computational grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. Grid computing raises challenging issues in many areas of computer science, bioinformatics, high energy physics and especially in the...

    Provided By Anna University

  • White Papers // Sep 2013

    S-Spray Routing Protocol for Intermittently Connected Mobile Networks

    The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. The intermittent connectivity is due to the dense nature of the network. The dense nature is mainly due to the high mobility of the nodes in the network. Routing in such a sparse...

    Provided By Anna University

  • White Papers // Aug 2013

    Data Storage Security in Cloud Using Metadata

    In cloud era as the data stored is away from the user, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient method for providing security to the data stored at the data server through metadata. This method provides security using cipher key...

    Provided By Anna University

  • White Papers // Aug 2013

    Attribute Based Secure Data Access in Cloud Computing

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Attribute based secure data access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the...

    Provided By Anna University

  • White Papers // Aug 2013

    Monitoring the User Navigation in the Cloud Application

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By Anna University

  • White Papers // Jul 2013

    Implementation Strategies for Biometric Fingerprint Authentication for E-Governance Application

    E-Governance applications and services are secured using the key factor called Authentication. Most commonly used credentials for authentication and authorization are user name and password which is not sufficient for security. As Internet is more vulnerable nowadays, one factor authentication alone is not secure and it is more vulnerable for...

    Provided By Anna University

  • White Papers // May 2013

    A Study of Routing Techniques in Intermittently Connected MANETs

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three...

    Provided By Anna University

  • White Papers // May 2013

    Third Party Administration Based Security Mechanism for Trusted Ad Hoc Network

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographical location which also increases security problem. There are number of attacks due to lack of trust in wireless network, the idea of enforcing application centric network policy for MANETs from link...

    Provided By Anna University

  • White Papers // May 2013

    Forward Error Correction Code for MIMO-OFDM System in AWGN and Rayleigh Fading Channel

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration....

    Provided By Anna University

  • White Papers // May 2013

    A Security Gateway for Message Exchange in Services by Streaming and Validation

    Cloud Computing is found to be today's most commonly used Service Oriented Architecture (SOA) implementation. Cloud services are exposed as Web Services which follow the industry standards such as WSDL for service description, SOAP for enabling request and response and so on. Hence Web services security is of particular importance...

    Provided By Anna University

  • White Papers // May 2013

    An Efficient Approach for Effectual Mining of Relational Patterns from Multi-Relational Database

    Data mining is an extremely challenging and hopeful research topic due to its well-built application potential and the broad accessibility of the massive quantities of data in databases. Still, the rising significance of data mining in practical real world necessitates ever more complicated solutions while data includes of a huge...

    Provided By Anna University

  • White Papers // Apr 2013

    Byzantine Fault Tolerance Based Security Challenges for The Privacy Preserving Public Cloud

    Cloud computing make it possible to store large amounts of data. To monitoring User an entity whose data to be stores in the cloud and relies on the cloud for data storage and computation, server is an entity which manages by cloud service provider to provide data storage service and...

    Provided By Anna University

  • White Papers // Mar 2013

    Error Correction for a Secure Multicast Group Key Management Using Gray Code

    Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes...

    Provided By Anna University

  • White Papers // Mar 2013

    Security System Based on Viola Jones Detection

    Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module)....

    Provided By Anna University

  • White Papers // Mar 2013

    Modified Optimal Performance Mapping on Reconfigurable Architecture for Multimedia Applications

    In this paper, Coarse-Grained Reconfigurable Architectures (CGRAs) are capable of achieving both goals of high performance and flexibility. CGRAs not only improve performance by exploiting the features of repetitive computations, but also can adapt to diverse computations by dynamically changing configurations of an array of its internal Processing Elements (PEs)...

    Provided By Anna University

  • White Papers // Mar 2013

    An Energy Efficient Analysis of S-Mac and H-Mac Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is an interesting topic to the researchers because of its various applications. The applications are health monitoring and environmental monitoring, Industrial Process Monitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and Military Security Systems. The wireless medium requires highly optimized medium Access Protocols to avoid...

    Provided By Anna University

  • White Papers // Mar 2013

    A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network

    Design of reliable Wireless Sensor Network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues and requirements of reliability improvement mechanism depend on the available resources and application for which the WSN...

    Provided By Anna University

  • White Papers // Mar 2013

    Encrypted Data Storage in Cloud Environment

    Cloud Computing is the use of computing resources that are deliverable as a service over a network. Cloud computing relies on sharing of resources to achieve coherence. The cloud server may leak data information due to unauthorized entities or even be hacked. Encrypted storage and retrieval model is used. Searchable...

    Provided By Anna University

  • White Papers // Feb 2013

    Information Retrieval Based on Semantic Matching Approach in Web Service Discovery

    Information retrieval from web has been a tough task due to an increased amount of contents dynamically day by day. In that current information retrieval results are only based on syntactic description for web service which may not provide an accurate solution for all service requests. On the other hand...

    Provided By Anna University

  • White Papers // Feb 2013

    An Unsupervised Model to detect Web Spam Based on Qualified Link Analysis and Language Models

    With the massive use of the internet and the search engines, a major problem that comes to light is the Web Spam. Web spam can be detected by analyzing the various features of web pages and categorizing them as belonging to the spam or non-spam category. The proposed work considers...

    Provided By Anna University

  • White Papers // Jan 2013

    Securing and Managing the Data With Efficient Architecture in Cloud Computing Environment

    Cloud computing technology and services has become an important issue in the recent years. Cloud Computing needs lot of attention, time and innovative concepts for the technology to mature over a period of time. Many organizations show interest in adopting cloud computing technology and services because of its socio economic...

    Provided By Anna University

  • White Papers // Jan 2013

    Maximization of Lifetime and Reducing Power Consumption in Wireless Sensor Network Using Protocol

    This paper is to avoid duplicate transmission, node reconfiguration and power consumption in Wireless Sensor Networks (WSN). Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Jan 2013

    Towards Fault Handling in B2B Collaboration Using Orchestration Based Web Services Composition

    Recently, Web Services Composition is receiving significant amount of interest as an important strategy to allow Business-to-Business collaboration. The current Web Services composition solutions are inherently unreliable, so how to deliver reliable Web Services composition over unreliable web services is a significant and challenging problem. In this paper, the authors...

    Provided By Anna University

  • White Papers // Nov 2012

    A Mobile Payment System Through Independent M-Signature Service

    Nowadays a great number of applications require the use of Electronic Signature (e-signature) and non-repudiation services such as certified e-mail, contract signing, electronic payment system and etc... The authenticity and integrity generated by e-signature in electronic document is like a handwritten signature in the paper document. The mobile user would...

    Provided By Anna University

  • White Papers // Nov 2012

    Security Implications of Distributed Database Management System Models

    Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and Multilevel Access Controls (MAC), protection and integrity maintenance. While determining which distributed database replica will...

    Provided By Anna University

  • White Papers // Nov 2012

    Non Linear Optimum Filtering and Smoothing Based IMM in GPS Navigation

    The information from Global Positioning System (GPS) has been increasingly used in many applications. Navigation is one of the important applications. To estimate the state of the vehicle, Kalman Filter (KF) is used traditionally. Since KF gives inaccurate results during non linear motion of the vehicle, an Unscented Kalman Filter...

    Provided By Anna University

  • White Papers // Nov 2012

    Energy Reduction Routing In Wireless Ad-Hoc Network

    Ad hoc networks are dynamically created and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any type of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The main objective...

    Provided By Anna University

  • White Papers // Nov 2012

    A Secure Key Transfer Protocol for Group Communication

    Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols...

    Provided By Anna University

  • White Papers // Oct 2012

    PKI Based Signcryption without Pairing: An Efficient Scheme with Tight Security Reduction

    Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, the authors address the question whether it is feasible to construct a PKI based signcryption...

    Provided By Anna University

  • White Papers // Oct 2012

    Multilayer Image Watermarking Scheme for Providing High Security

    The main theme of this application is to provide an algorithm color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the...

    Provided By Anna University

  • White Papers // Oct 2012

    A New Optimal Reverse Reactive Routing Protocol for the Shortest Route in Ad Hoc Networks

    In this paper, the authors propose a mechanism in which power consumption in a sensor network can be reduced greatly by taking into account the fairness factors and to increase the probability of nodes for successful packet transmission with lowest possible Signal to Noise Ratio (SNR) in a crowded environment....

    Provided By Anna University

  • White Papers // Sep 2012

    L Diversity on K-Anonymity With External Database for Improving Privacy Preserving Data Publishing

    The data must be secure and measurable at the public when it releases to view. The data table produces personal information and sensitive values. They are maintained for secrecy, the anonymity is the best method to protect the data. There are many anonymity methods to protect the data. k -anonymity...

    Provided By Anna University

  • White Papers // Sep 2012

    A QoS Towards Dynamic Web Services Recapitulation and Selection

    Web services are the components, communicates via Internet or Web. Fundamental vision of the Web service is a brokerage system. The Recapitulation of Web service is an approach for the effective integration of distributed, heterogeneous and autonomous applications to build more Structured and value added services. Web services selection algorithms...

    Provided By Anna University

  • White Papers // Aug 2012

    Enhanced RSACRT for Energy Efficient Authentication to Wireless Sensor Networks Security

    The Security in WSN has become a challenge because of its inherent limitations of resources imposed on the sensor nodes. Authentication and key management scheme allows WSNs to be used with confidence and maintains integrity of data in sensor networks. Approach: In the WSN limited resource scenario the generation of...

    Provided By Anna University

  • White Papers // Aug 2012

    Multimedia Transmission in Multi Hop Wireless Sensor Network

    Quality of Service (QoS) is a requirement for proper functioning of traditional and modern networks. Wireless Sensor Networks (WSN) is adversely affected because of mobility, harsh communication medium, and environment behavior. Quality of Service is a crucial aspect in WSN design information sent by nodes and delivered according to QoS...

    Provided By Anna University

  • White Papers // Nov 2012

    A Mobile Payment System Through Independent M-Signature Service

    Nowadays a great number of applications require the use of Electronic Signature (e-signature) and non-repudiation services such as certified e-mail, contract signing, electronic payment system and etc... The authenticity and integrity generated by e-signature in electronic document is like a handwritten signature in the paper document. The mobile user would...

    Provided By Anna University

  • White Papers // Nov 2012

    Non Linear Optimum Filtering and Smoothing Based IMM in GPS Navigation

    The information from Global Positioning System (GPS) has been increasingly used in many applications. Navigation is one of the important applications. To estimate the state of the vehicle, Kalman Filter (KF) is used traditionally. Since KF gives inaccurate results during non linear motion of the vehicle, an Unscented Kalman Filter...

    Provided By Anna University

  • White Papers // Sep 2011

    NETRAWALM: Network Based Resource Aware Application Layer Multicast for Multiparty Video Conference

    IP Multicast is one of the most absolute methods for large bandwidth Internet applications such as video conference, IPTV, E-Learning and Telemedicine etc., but due to security and management reason IP Multicast is not enabled in Internet backbone routers. To achieve these challenges, lot of Application Layer Multicast (ALM) has...

    Provided By Anna University

  • White Papers // Sep 2011

    Energy, Throughput and Area Evaluation of Regular and Irregular Network on Chip Architectures

    Network-on-chip has been proposed in System-on-Chip to achieve high performance, reusability and scalability through generating application specific topologies. Application specific topologies are irregular in structure and take into account certain factors like communication weight, area and energy constraints while building up the topology. Regular topologies like 2D mesh, spidergon are...

    Provided By Anna University

  • White Papers // May 2011

    An Energy Efficient Spatial Correlation Based Data Gathering Algorithm for Wireless Sensor Networks

    Wireless sensor networks have a wide range of applications including environmental monitoring. These networks consist of wireless sensor nodes which are densely deployed to provide a wider coverage area. The dense deployment of the sensor node provides spatial correlation in the network. In this paper, an efficient data gathering approach...

    Provided By Anna University

  • White Papers // Jan 2013

    Maximization of Lifetime and Reducing Power Consumption in Wireless Sensor Network Using Protocol

    This paper is to avoid duplicate transmission, node reconfiguration and power consumption in Wireless Sensor Networks (WSN). Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by...

    Provided By Anna University

  • White Papers // Sep 2012

    L Diversity on K-Anonymity With External Database for Improving Privacy Preserving Data Publishing

    The data must be secure and measurable at the public when it releases to view. The data table produces personal information and sensitive values. They are maintained for secrecy, the anonymity is the best method to protect the data. There are many anonymity methods to protect the data. k -anonymity...

    Provided By Anna University

  • White Papers // Sep 2012

    A QoS Towards Dynamic Web Services Recapitulation and Selection

    Web services are the components, communicates via Internet or Web. Fundamental vision of the Web service is a brokerage system. The Recapitulation of Web service is an approach for the effective integration of distributed, heterogeneous and autonomous applications to build more Structured and value added services. Web services selection algorithms...

    Provided By Anna University

  • White Papers // Apr 2012

    Establishment of Secure Communication in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consists of small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. Wireless Sensor Networks (WSN) have attracted significant interests from the research community in a wide range of applications such as target tracking, environment monitoring, military sensing, distributed measurement...

    Provided By Anna University

  • White Papers // Aug 2012

    Multimedia Transmission in Multi Hop Wireless Sensor Network

    Quality of Service (QoS) is a requirement for proper functioning of traditional and modern networks. Wireless Sensor Networks (WSN) is adversely affected because of mobility, harsh communication medium, and environment behavior. Quality of Service is a crucial aspect in WSN design information sent by nodes and delivered according to QoS...

    Provided By Anna University

  • White Papers // Feb 2012

    Location Management Using Genetic Algorithm Tuned Neural Network in Mobile Networks

    In this paper, the authors present a User Pattern Learning (UPL) strategy using Genetic Algorithm tuned Artificial Neural Network (GAANN) to reduce the location update cost. The system maintains a list of places where each user is most likely to be in at each time interval. The intelligence of the...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Jun 2012

    ARRP: Azimuth Restricted Routing Protocol for Ad Hoc Networks

    Ad Hoc Networks consists of set of mobile nodes forming spontaneous network. There is a need for an efficient routing protocol for Ad Hoc networks over the years. Bandwidth utilization and node power consumption are two important factors in wireless transmissions. This paper presents simulation model of new routing protocol...

    Provided By Anna University

  • White Papers // Jun 2012

    Topology Management Based Energy Balancing Model for IPS in MANET Using MEC Clustering Algorithm

    In Mobile Ad-hoc Networks, the topology management is a crucial factor that plays a vital role to maintain the node cooperation and stability of the network in unpredicted movements of the nodes. Moreover, the resource consumption imposes problem with mobile nodes due to the variations of resource availability. The Intrusion...

    Provided By Anna University

  • White Papers // Jun 2012

    Efficient Source Routing Scheme for Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes without any centralized administration. These nodes collect the information through overhearing and store information in route caches through routing protocol. When the route cache freshness is absent, it leads to the stale route information resulting in pollution caches. If...

    Provided By Anna University

  • White Papers // Mar 2010

    Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side

    Cross Site Scripting (XSS) Flaws are currently the most popular security problems in modern web applications. These Flaws make use of vulnerabilities in the code of web-applications, resulting in serious consequences, such as theft of cookies, passwords and other personal credentials. Cross-site scripting Flaws occur when accessing information in intermediate...

    Provided By Anna University

  • White Papers // Mar 2013

    Error Correction for a Secure Multicast Group Key Management Using Gray Code

    Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes...

    Provided By Anna University

  • White Papers // Mar 2013

    Security System Based on Viola Jones Detection

    Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module)....

    Provided By Anna University

  • White Papers // Mar 2013

    Modified Optimal Performance Mapping on Reconfigurable Architecture for Multimedia Applications

    In this paper, Coarse-Grained Reconfigurable Architectures (CGRAs) are capable of achieving both goals of high performance and flexibility. CGRAs not only improve performance by exploiting the features of repetitive computations, but also can adapt to diverse computations by dynamically changing configurations of an array of its internal Processing Elements (PEs)...

    Provided By Anna University

  • White Papers // Feb 2013

    Information Retrieval Based on Semantic Matching Approach in Web Service Discovery

    Information retrieval from web has been a tough task due to an increased amount of contents dynamically day by day. In that current information retrieval results are only based on syntactic description for web service which may not provide an accurate solution for all service requests. On the other hand...

    Provided By Anna University

  • White Papers // Feb 2013

    An Unsupervised Model to detect Web Spam Based on Qualified Link Analysis and Language Models

    With the massive use of the internet and the search engines, a major problem that comes to light is the Web Spam. Web spam can be detected by analyzing the various features of web pages and categorizing them as belonging to the spam or non-spam category. The proposed work considers...

    Provided By Anna University

  • White Papers // Feb 2012

    Design of Sensor Module for Better Energy Saving

    In this paper, the authors presents a new methodology for intelligent energy-saving system. The goal of real energy-saving is to be done from the view-point of system-orient strategy instead of materials. In this system design, temperature value, humidity value, CO density level, and power level are to be sensed. In...

    Provided By Anna University

  • White Papers // Feb 2012

    VLSI Design of Secured Cryptosystem

    In this paper, the authors proposes Image cryptosystem scheme to achieve High speed and to improve the security level by using Discrete Wavelet Transform (DWT) and Chaos based approach in to the image. Internet now a day is one of the most popular modes of communications, and it suffers from...

    Provided By Anna University

  • White Papers // Feb 2012

    Blocking Hacking Users in Anonymizing Network Using Blacklisting

    In this paper, the authors explains about blocking the misbehaving users who access the blocked websites through anonymizing networks. In this network, many people misbehaving the popular websites like face book, orkut, hi5, twitter, etc... through hide the client's IP address. But, website administrator routinely rely on IP address blocking...

    Provided By Anna University

  • White Papers // Feb 2012

    Ensuring Data Integrity in Cloud Computing

    Cloud computing provides convenient on-demand network access to a shared pool of configurable computing resources. The resources can be rapidly deployed with great efficiency and minimal management overhead. Cloud is an insecure computing platform from the view point of the cloud users, the system must design mechanisms that not only...

    Provided By Anna University

  • White Papers // Sep 2008

    An Analytical Modeling of Threshold Voltage and Subthreshold Swing on Dual Material Surrounding Gate Nanoscale MOSFETs for High Speed Wireless Communication

    A new Two Dimensional (2-D) analytical model for the Threshold Voltage on Dual Material Surrounding Gate (DMSG) MOSFETs is presented in this paper. The parabolic approximation technique is used to solve the 2-D Poisson equation with suitable boundary conditions. The simple and accurate analytical expression for the threshold voltage and...

    Provided By Anna University

  • White Papers // May 2012

    EENMDRA: Efficient Energy and Node Mobility Based Data Replication Algorithm for MANET

    A Mobile Ad-hoc NETwork (MANET) is a self organizing, rapidly deployable network which consists of wireless nodes without infrastructure. All nodes in a MANET are capable of moving actively and can be connected dynamically. It is used in various applications like video conferencing, rescue operations, military applications, Disaster Management etc....

    Provided By Anna University

  • White Papers // Mar 2013

    An Energy Efficient Analysis of S-Mac and H-Mac Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is an interesting topic to the researchers because of its various applications. The applications are health monitoring and environmental monitoring, Industrial Process Monitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and Military Security Systems. The wireless medium requires highly optimized medium Access Protocols to avoid...

    Provided By Anna University

  • White Papers // Mar 2013

    A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network

    Design of reliable Wireless Sensor Network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues and requirements of reliability improvement mechanism depend on the available resources and application for which the WSN...

    Provided By Anna University

  • White Papers // Mar 2013

    Encrypted Data Storage in Cloud Environment

    Cloud Computing is the use of computing resources that are deliverable as a service over a network. Cloud computing relies on sharing of resources to achieve coherence. The cloud server may leak data information due to unauthorized entities or even be hacked. Encrypted storage and retrieval model is used. Searchable...

    Provided By Anna University

  • White Papers // Nov 2012

    Energy Reduction Routing In Wireless Ad-Hoc Network

    Ad hoc networks are dynamically created and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any type of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The main objective...

    Provided By Anna University

  • White Papers // May 2013

    Forward Error Correction Code for MIMO-OFDM System in AWGN and Rayleigh Fading Channel

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration....

    Provided By Anna University

  • White Papers // Sep 2011

    CNOA: Challenging Number Approach for Uncovering TCP SYN Flooding Using SYN Spoofing Attack

    The challenging number is used for the detection of Spoofing attack. The IP Spoofing is considered to be one of the potentially brutal attack which acts as a tool for the DDoS attack which is considered to be a major threat among security problems in today's internet. These kinds of...

    Provided By Anna University

  • White Papers // Sep 2011

    Adaptive Association Rule Mining Based Cross Layer Intrusion Detection System for MANET

    Mobile Ad-hoc wireless NETworks (MANET) are a significant area of research with many applications. MANETs are more vulnerable to malicious attack. Authentication and encryption techniques can be used as the first line of defense for reducing the possibilities of attacks. Alternatively, these approaches have several demerits and designed for a...

    Provided By Anna University

  • White Papers // Sep 2011

    Error Detection and Correction for Distributed Group Key Agreement Protocol

    Integrating an efficient Error detection and correction scheme with less encoding and decoding complexity to support the distribution of keying material in a secure group communication is an important issue, since the amount of information carried out in the wireless channel is high which produces more errors due to noise...

    Provided By Anna University

  • White Papers // Jun 2011

    Data Aggregation and Privacy for Police Patrols

    With a widespread growth in the potential applications of Wireless Sensor Networks, the need for reliable security mechanisms for them has increased manifold. This paper proposes a scheme, Privacy for Police Patrols (PPP), to provide secure data aggregation that relies on multilevel routing. Privacy factors have been identified and implemented....

    Provided By Anna University

  • White Papers // Dec 2011

    A Dynamic Approach for Anomaly Detection in AODV

    Mobile Ad hoc NETworks (MANETs) are relatively vulnerable to malicious network attacks, and therefore, security is a more significant issue than infrastructure-based wire-less networks. In MANETs, it is difficult to identify malicious hosts as the topology of the network dynamically changes. A malicious host can easily interrupt a route for...

    Provided By Anna University

  • White Papers // Jul 2011

    A Recent Technique to Detect Sink Hole Attacks in WSN

    A Wireless Sensor Network (WSN) consists of large number of low cost low power sensor nodes. The nature of wireless sensor networks makes them very attractive to attackers. One of the most popular and serious attacks in wireless sensor networks is sink hole attack and most existing protocols to defend...

    Provided By Anna University

  • White Papers // Jul 2011

    An Overview of Security Problems in MANET

    Mobile Ad hoc NETworks (MANETs) can be defined as a collection of large number of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. Each node participating in the network acts both as host and a router and must therefore is willing...

    Provided By Anna University

  • White Papers // Oct 2011

    An Overview of Potential Vulnerabilities and Requirements of MANET

    In mobile ad-hoc networks, nodes do not rely on any routing infrastructure but relay packets for each other. Thus communication in mobile ad-hoc networks functions properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate, for example to...

    Provided By Anna University