Anna University

Displaying 1-40 of 201 results

  • White Papers // Oct 2014

    A Survey on Deadline Constrained Workflow Scheduling Algorithms in Cloud Environment

    Cloud computing is the latest blooming technology in the era of computer science and information technology domain. There is an enormous pool of data centers, which are termed as clouds where the services and associated data are being deployed and users need a constant Internet connection to access them. One...

    Provided By Anna University

  • White Papers // May 2014

    Mining Search Log for Privacy Definitions and Phish Safe

    Search engine spamming is a practice of misleading the search engine and increasing the page rank of undeserving websites. The black hat Search Engine Optimization (SEO) techniques lead to untrustworthy results for search engines. Some commonly used black hat techniques has been characterized and proposed a new way to counter...

    Provided By Anna University

  • White Papers // Apr 2014

    Detect SQLI Attacks in Web Apps Using NVS

    Now-a-days the world of information era, the authors can get information just their single click by using web application. Web applications are popular due to the ubiquity of web browsers, and the convenience of using a web browser as a client, sometimes called a thin client. It are playing a...

    Provided By Anna University

  • White Papers // Dec 2013

    Effective Ant Based Routing Algorithm for Data Replication in Manets

    In mobile ad hoc network, the nodes often move and keep on change its topology. Data packets can be forwarded from one node to another on demand. To increase the data accessibility data are replicated at nodes and made as sharable to other nodes. Assuming that all mobile host cooperative...

    Provided By Anna University

  • White Papers // Nov 2013

    Optimization of Vertical Links in a Three-Dimensional NOC Based Multicore Crypto Processor for Cloud Computing

    The popularity of multiprocessors over the last few years has been made possible by Network-on-Chip (NoC). The advent of Three-Dimensional Network-on-Chip (3D NoC) has facilitated the communication in Three-Dimensional Integrated Circuits (3D IC). However, the implementation of 3D NoC is a vital issue with the fabrication of Through-Silicon-Via (TSV), due...

    Provided By Anna University

  • White Papers // Oct 2013

    Cloud Computing Security and Encryption

    Cloud computing has been the talk of the town in the recent years. It has been suggested to everyone to store their data on a cloud. This has led to the birth of a new domain of research. As the cloud technology improves over time, so does the security threats....

    Provided By Anna University

  • White Papers // Sep 2013

    Elliptic Curve Cryptography in Securing Networks by Mobile Authentication

    In this paper, the authors propose an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to...

    Provided By Anna University

  • White Papers // Sep 2013

    Distributed Heterogeneous Data Management in Grid Computing

    Ensembles of distributed, heterogeneous resources, or computational grids, have emerged as popular platforms for deploying large-scale and resource-intensive applications. Large collaborative efforts are currently underway to provide the necessary software infrastructure. Grid computing raises challenging issues in many areas of computer science, bioinformatics, high energy physics and especially in the...

    Provided By Anna University

  • White Papers // Sep 2013

    S-Spray Routing Protocol for Intermittently Connected Mobile Networks

    The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where a complete connectivity never exists. The intermittent connectivity is due to the dense nature of the network. The dense nature is mainly due to the high mobility of the nodes in the network. Routing in such a sparse...

    Provided By Anna University

  • White Papers // Aug 2013

    Data Storage Security in Cloud Using Metadata

    In cloud era as the data stored is away from the user, privacy and integrity of the data plays a crucial role. This paper proposes a practical and efficient method for providing security to the data stored at the data server through metadata. This method provides security using cipher key...

    Provided By Anna University

  • White Papers // Aug 2013

    Attribute Based Secure Data Access in Cloud Computing

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Attribute based secure data access has proposed for access control of outsourced data in cloud computing. The person wants to sale their business logic to some others with attractive mechanism for showing the...

    Provided By Anna University

  • White Papers // Aug 2013

    Monitoring the User Navigation in the Cloud Application

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this new...

    Provided By Anna University

  • White Papers // Jul 2013

    Implementation Strategies for Biometric Fingerprint Authentication for E-Governance Application

    E-Governance applications and services are secured using the key factor called Authentication. Most commonly used credentials for authentication and authorization are user name and password which is not sufficient for security. As Internet is more vulnerable nowadays, one factor authentication alone is not secure and it is more vulnerable for...

    Provided By Anna University

  • White Papers // May 2013

    A Study of Routing Techniques in Intermittently Connected MANETs

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three...

    Provided By Anna University

  • White Papers // May 2013

    Third Party Administration Based Security Mechanism for Trusted Ad Hoc Network

    Wireless networks are gaining popularity to its peak today, as the user's wants wireless connectivity irrespective of their geographical location which also increases security problem. There are number of attacks due to lack of trust in wireless network, the idea of enforcing application centric network policy for MANETs from link...

    Provided By Anna University

  • White Papers // May 2013

    Forward Error Correction Code for MIMO-OFDM System in AWGN and Rayleigh Fading Channel

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to enhance the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration....

    Provided By Anna University

  • White Papers // May 2013

    A Security Gateway for Message Exchange in Services by Streaming and Validation

    Cloud Computing is found to be today's most commonly used Service Oriented Architecture (SOA) implementation. Cloud services are exposed as Web Services which follow the industry standards such as WSDL for service description, SOAP for enabling request and response and so on. Hence Web services security is of particular importance...

    Provided By Anna University

  • White Papers // May 2013

    An Efficient Approach for Effectual Mining of Relational Patterns from Multi-Relational Database

    Data mining is an extremely challenging and hopeful research topic due to its well-built application potential and the broad accessibility of the massive quantities of data in databases. Still, the rising significance of data mining in practical real world necessitates ever more complicated solutions while data includes of a huge...

    Provided By Anna University

  • White Papers // Apr 2013

    Byzantine Fault Tolerance Based Security Challenges for The Privacy Preserving Public Cloud

    Cloud computing make it possible to store large amounts of data. To monitoring User an entity whose data to be stores in the cloud and relies on the cloud for data storage and computation, server is an entity which manages by cloud service provider to provide data storage service and...

    Provided By Anna University

  • White Papers // Mar 2013

    Modified Optimal Performance Mapping on Reconfigurable Architecture for Multimedia Applications

    In this paper, Coarse-Grained Reconfigurable Architectures (CGRAs) are capable of achieving both goals of high performance and flexibility. CGRAs not only improve performance by exploiting the features of repetitive computations, but also can adapt to diverse computations by dynamically changing configurations of an array of its internal Processing Elements (PEs)...

    Provided By Anna University

  • White Papers // Mar 2013

    A Survey on Modeling and Enhancing Reliability of Wireless Sensor Network

    Design of reliable Wireless Sensor Network (WSN) needs to address the failure of single or multiple network components and implementation of the techniques to tolerate the faults occurred at various levels. The issues and requirements of reliability improvement mechanism depend on the available resources and application for which the WSN...

    Provided By Anna University

  • White Papers // Mar 2013

    Security System Based on Viola Jones Detection

    Iris recognition is a biometric system for access control that uses the most unique characteristic of the human body, the iris employed in automated border crossings, national ID systems, etc. This paper illustrates techniques to improve performance of iris recognition system based on stationary images using NI LabVIEW (Vision Module)....

    Provided By Anna University

  • White Papers // Mar 2013

    Error Correction for a Secure Multicast Group Key Management Using Gray Code

    Key agreement protocols are designed to provide two or more specified parties communicating over public channels with a common shared secret key, which may subsequently be used to exchange information among communicating parties. Therefore, building secure key agreement protocols over open networks is essential in information security. Error Correcting Codes...

    Provided By Anna University

  • White Papers // Mar 2013

    An Energy Efficient Analysis of S-Mac and H-Mac Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is an interesting topic to the researchers because of its various applications. The applications are health monitoring and environmental monitoring, Industrial Process Monitoring, Target detection, Target tracking, Energy Efficiency, Disaster Management and Military Security Systems. The wireless medium requires highly optimized medium Access Protocols to avoid...

    Provided By Anna University

  • White Papers // Mar 2013

    Encrypted Data Storage in Cloud Environment

    Cloud Computing is the use of computing resources that are deliverable as a service over a network. Cloud computing relies on sharing of resources to achieve coherence. The cloud server may leak data information due to unauthorized entities or even be hacked. Encrypted storage and retrieval model is used. Searchable...

    Provided By Anna University

  • White Papers // Feb 2013

    Information Retrieval Based on Semantic Matching Approach in Web Service Discovery

    Information retrieval from web has been a tough task due to an increased amount of contents dynamically day by day. In that current information retrieval results are only based on syntactic description for web service which may not provide an accurate solution for all service requests. On the other hand...

    Provided By Anna University

  • White Papers // Feb 2013

    An Unsupervised Model to detect Web Spam Based on Qualified Link Analysis and Language Models

    With the massive use of the internet and the search engines, a major problem that comes to light is the Web Spam. Web spam can be detected by analyzing the various features of web pages and categorizing them as belonging to the spam or non-spam category. The proposed work considers...

    Provided By Anna University

  • White Papers // Jan 2013

    Securing and Managing the Data With Efficient Architecture in Cloud Computing Environment

    Cloud computing technology and services has become an important issue in the recent years. Cloud Computing needs lot of attention, time and innovative concepts for the technology to mature over a period of time. Many organizations show interest in adopting cloud computing technology and services because of its socio economic...

    Provided By Anna University

  • White Papers // Jan 2013

    Survey of Mapping XML DTDs (Documents) to Relational Schemas

    Extensible Markup Language (XML) is emerging as the data format of the web era. XML has the characteristics, such as the extensibility and self-description, which make it becomes a criterion of data exchanging between applications. In recent years, XML has become the standard format of data representation and exchange in...

    Provided By Anna University

  • White Papers // Jan 2013

    Maximization of Lifetime and Reducing Power Consumption in Wireless Sensor Network Using Protocol

    This paper is to avoid duplicate transmission, node reconfiguration and power consumption in Wireless Sensor Networks (WSN). Wireless sensor network requires robust and energy efficient communication protocols to minimize the energy consumption as much as possible. However, the lifetime of sensor network reduces due to the adverse impacts caused by...

    Provided By Anna University

  • White Papers // Jan 2013

    Towards Fault Handling in B2B Collaboration Using Orchestration Based Web Services Composition

    Recently, Web Services Composition is receiving significant amount of interest as an important strategy to allow Business-to-Business collaboration. The current Web Services composition solutions are inherently unreliable, so how to deliver reliable Web Services composition over unreliable web services is a significant and challenging problem. In this paper, the authors...

    Provided By Anna University

  • White Papers // Nov 2012

    A Mobile Payment System Through Independent M-Signature Service

    Nowadays a great number of applications require the use of Electronic Signature (e-signature) and non-repudiation services such as certified e-mail, contract signing, electronic payment system and etc... The authenticity and integrity generated by e-signature in electronic document is like a handwritten signature in the paper document. The mobile user would...

    Provided By Anna University

  • White Papers // Nov 2012

    Security Implications of Distributed Database Management System Models

    Security features must be addressed when escalating a distributed database. The choice between the object oriented and the relational data model, several factors should be considered. The most important of these factors are single and Multilevel Access Controls (MAC), protection and integrity maintenance. While determining which distributed database replica will...

    Provided By Anna University

  • White Papers // Nov 2012

    Non Linear Optimum Filtering and Smoothing Based IMM in GPS Navigation

    The information from Global Positioning System (GPS) has been increasingly used in many applications. Navigation is one of the important applications. To estimate the state of the vehicle, Kalman Filter (KF) is used traditionally. Since KF gives inaccurate results during non linear motion of the vehicle, an Unscented Kalman Filter...

    Provided By Anna University

  • White Papers // Nov 2012

    A Secure Key Transfer Protocol for Group Communication

    Providing security for messages in group communication is more essential and critical nowadays. In group oriented applications such as Video conferencing and entertainment applications, it is necessary to secure the confidential data in such a way that intruders are not able to modify or transmit the data. Key transfer protocols...

    Provided By Anna University

  • White Papers // Nov 2012

    Energy Reduction Routing In Wireless Ad-Hoc Network

    Ad hoc networks are dynamically created and maintained by the individual nodes comprising the network. They do not require a pre-existing architecture for communication purposes and do not rely on any type of wired infrastructure; in an ad hoc network all communication occurs through a wireless median. The main objective...

    Provided By Anna University

  • White Papers // Oct 2012

    PKI Based Signcryption without Pairing: An Efficient Scheme with Tight Security Reduction

    Signcryption is a cryptographic primitive that fulfill the functionalities of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional sign-then-encrypt or encrypt-then-sign approach. In this paper, the authors address the question whether it is feasible to construct a PKI based signcryption...

    Provided By Anna University

  • White Papers // Oct 2012

    Multilayer Image Watermarking Scheme for Providing High Security

    The main theme of this application is to provide an algorithm color image watermark to manage the attacks such as rotation, scaling and translation. In the existing watermarking algorithms, those exploited robust features are more or less related to the pixel position, so they cannot be more robust against the...

    Provided By Anna University

  • White Papers // Oct 2012

    A New Optimal Reverse Reactive Routing Protocol for the Shortest Route in Ad Hoc Networks

    In this paper, the authors propose a mechanism in which power consumption in a sensor network can be reduced greatly by taking into account the fairness factors and to increase the probability of nodes for successful packet transmission with lowest possible Signal to Noise Ratio (SNR) in a crowded environment....

    Provided By Anna University

  • White Papers // Sep 2012

    A QoS Towards Dynamic Web Services Recapitulation and Selection

    Web services are the components, communicates via Internet or Web. Fundamental vision of the Web service is a brokerage system. The Recapitulation of Web service is an approach for the effective integration of distributed, heterogeneous and autonomous applications to build more Structured and value added services. Web services selection algorithms...

    Provided By Anna University

  • White Papers // Nov 2010

    Attacks in WEB Based Embedded Applications

    This paper deals with the issues related to embedded applications when they are implemented in internet. There are various attacks in embedded systems when implemented in the internet. These attacks have a negligible effect in the operating system which results in the decrease in the system performance. But in embedded...

    Provided By Anna University

  • White Papers // Dec 2009

    Fault Injection Based Analysis of Defect Amplification Index in Technology Variant Commercial Software Application Development

    Fault injection involves the deliberate insertion of faults or errors into software in order to determine its response and to study its behaviour. Fault Injection Experiments have proven to be an effective method for measuring and studying response of defects, validating fault-tolerant systems, and observing how systems behave in the...

    Provided By Anna University

  • White Papers // Jul 2010

    Location Management Technique to Reduce Complexity in Cellular Networks

    An important issue in the design of mobile computing is how to manage the location information of mobile nodes in wireless cellular networks. The existing system has two approaches. First approach is spatial quantization technique in which location update takes place only when the mobile terminal move from one location...

    Provided By Anna University

  • White Papers // Jan 2011

    IMM Based Kalman Filter for Channel Estimation in MB OFDM Systems

    Ultra-Wide Band (UWB) communication is one of the most promising technologies for high data rate wireless networks for short range applications. This paper proposes a blind channel estimation method namely IMM (Interactive Multiple Model) Based Kalman algorithm for UWB OFDM systems. IMM based Kalman filter is proposed to estimate frequency...

    Provided By Anna University

  • White Papers // Mar 2010

    An Economic-Based Resource Management and Scheduling for Grid Computing Applications

    Resource management and scheduling plays a crucial role in achieving high utilization of resources in grid computing environments. Due to heterogeneity of resources, scheduling an application is significantly complicated and challenging task in grid system. Most of the researches in this area are mainly focused on to improve the performance...

    Provided By Anna University

  • White Papers // May 2011

    Performance Analysis of Web Service Model for Video on Demand

    In today's world, the demand for video in the Internet has gained high popularity. One of the best and optimal ways to provide the video contents on demand to users is through web services. This paper aims to develop a generalized web service model for providing video on demand. To...

    Provided By Anna University

  • White Papers // May 2011

    Semantic Search in Wiki Using HTML5 Microdata for Semantic Annotation

    Wiki, the collaborative web authoring system makes Web a huge collection of information, as the Wiki pages are authored by anybody all over the world. These Wiki pages, if annotated semantically, will serve as a universal pool of intellectual resources that can be read by machines too. This paper presents...

    Provided By Anna University

  • White Papers // Jan 2011

    Face Recognition System Using HGPP and Adaptive Binning Method

    Over the last decade, human face recognition has attracted significant attention because of its wide range of applications such as criminal identification, credit card verification, security system, scene surveillance, entertainments etc., In these applications various face recognition techniques are used and these techniques depends on the intensity of an image,...

    Provided By Anna University

  • White Papers // Nov 2009

    A Trust-Based Cross-Layer Security Protocol for Mobile Ad Hoc Networks

    In this paper, the authors develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the protocol, they design a trust based packet forwarding scheme for detecting and isolating...

    Provided By Anna University

  • White Papers // Jul 2010

    A Double Min Min Algorithm for Task Metascheduler on Hypercubic P2P Grid Systems

    Most of the existing solutions on task scheduling and resource management in grid computing are based on the traditional client/ server model, enforcing a homogeneous policy on making decisions and limiting the flexibility, unpredictable reliability and scalability of the system. Thus, the authors need well organized system architecture to provide...

    Provided By Anna University

  • White Papers // Nov 2009

    Customized Delegate Object Migration Model for Distributed Mobile Environment

    Mobile computing environment provides the information access to mobile users irrespective of their locations. The main objective of this paper is to develop a customized delegate object migration model for distributed mobile systems. The delegate object is an ambassador for a particular Mobile Host (MH) that maintains application specific data...

    Provided By Anna University

  • White Papers // Dec 2009

    Enhancing WLAN MAC Protocol Performance Using Differentiated VOIP and Data Services Strategy

    The application of Voice over-IP (VoIP) over WLANs has drawn a lot of attention from both industry and academia. Currently, the highly dense deployment of WLANs results in that the number of stations in a Basic Service Set (BSS) increases quickly, and thus the work on the capacity for VoIP...

    Provided By Anna University

  • White Papers // May 2011

    A Frame Work for Improvising Service of Multimedia Applications in Mobile Networks

    The main objective of this paper is to propose a frame work for improvising the service of multimedia applications in mobile networks. The framework has been proposed with a Cross-Layer Manager (CLM) and a Cross-Layer Coordinator (CLC) for improvising of multimedia applications by dynamically adapting the bandwidth under prevailing channel...

    Provided By Anna University

  • White Papers // Jul 2011

    Trust Worthy Architecture Implementation for Mobile Ad Hoc Networks

    A mobile ad hoc network is a wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. The wireless and distributed nature of mobile ad hoc networks poses greater challenges like security, mobility, scalability, reliability and other attributes of trustworthy communication. In...

    Provided By Anna University

  • White Papers // Mar 2011

    Anonymous Ad Hoc Network Performance Degradation Analysis in the Presence of Selfish

    Wireless Ad Hoc networks are characterized by dynamic change in topology, infrastructure-less architecture and creation of a network on the fly. Being wireless and co-operative in nature Ad Hoc networks are more prone to security breaches compared to their wired counterparts in all layers of the network. Most security protocols...

    Provided By Anna University

  • White Papers // Mar 2011

    ESAC Based Channel Aware Routing Using Route Handoff

    An ad hoc network is a collection of mobile stations forming a temporary network without the aid of any centralized coordinator. Internal threats due to changes in the node behavior that target the routing discovery or maintenance phase of the routing protocol (CA-AOMDV) which applies a preemptive handoff strategy to...

    Provided By Anna University

  • White Papers // May 2011

    Implementation of a Secured System With Roaming Server and Roaming Ports

    The main goal of this paper is to design and implement a secured system against Server hijacking, which leads to Denial of Service (DoS) attacks. This system uses more than one server for providing security. But only one server will be active at a time. The inactive servers act as...

    Provided By Anna University

  • White Papers // Jun 2011

    Investigation on the Performance of Linear Antenna Array Synthesis Using Genetic Algorithm

    Genetic Algorithm (GA) is a powerful optimization method which is used in this paper for the synthesis of antenna array radiation pattern in adaptive beamforming. The synthesis problem discussed in this paper is to find the amplitude excitation of the antenna array elements that are optimum to provide radiation pattern...

    Provided By Anna University

  • White Papers // Feb 2011

    Multicast Routing Authentication System Using Advanced Tesla

    The present strategies that reduce the delay associated with multicast authentication, make more efficient usage of receiver-side buffers, make delayed key disclosure authentication more resilient to buffer overflow denial of service attacks, and allow for multiple levels of trust in authentication. Throughout this base paper, the main focus of discussion...

    Provided By Anna University

  • White Papers // Feb 2011

    Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2

    Mobile Adhoc NETwork (MANET) with its unique and special characteristics is prone to a host of security threats from within and outside the network. The MANET architecture is well suited for conducting multicast communications as this greatly reduces the number of multicast packets traversing the network. The replication of multicast...

    Provided By Anna University

  • White Papers // Jan 2011

    The Trusted Computing Exemplary With Astonishing Security for Cloud Computing

    Cloud computing is a catch-all phrase that covers virtualized operating systems running on virtual hardware on untold numbers of physical servers. It is a paradigm where tasks are assigned to a combination of connections, software and services accessed over a network. The "Cloud" term has consumed High-Performance Computing (HPC), Grid...

    Provided By Anna University

  • White Papers // Aug 2009

    Adaptive Call Admission Control in TDD-CDMA Cellular Wireless Networks

    The Code Division Multiple Access system with Time Division Duplex mode (TDD-CDMA), adopting unbalanced slot allocation between uplink and downlink, can meet the asymmetric traffic requirement of multimedia services. Here a call admission control policy is proposed to support different multimedia applications. The scheme operates at the connection-level where the...

    Provided By Anna University

  • White Papers // Jul 2009

    Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles

    Denial of Service (DoS) vulnerabilities are one of the major concerns in today's Internet. Client-puzzles offer a good mechanism to defend servers against DoS attacks. This paper introduces the notion of hidden puzzle difficulty, where the attacker cannot determine the difficulty of the puzzle without expending a minimal amount of...

    Provided By Anna University

  • White Papers // Nov 2009

    Experimental Analysis of Receiver Performance of Optical CDMA System Using DPSK and OOK Modulation Through Balanced Detection and Optical Thresholding Techniques

    This paper is the performance of Optical Code Division Multiple Access (OCDMA) system is studied using Differential Phase Shift Keying (DPSK) with Balanced Detection (BD) and optical thresholding. For the OCDMA- DPSK receiver, the performance parameters bit error rate (BER), receiver sensitivity and spectral efficiency for asynchronous multiple access network...

    Provided By Anna University

  • White Papers // Jun 2009

    An Efficient Foreground Detection Algorithm for Visual Surveillance System

    This paper proposes an efficient foreground detection algorithm based on a new color space model and morphological filtering. This model uses each pixel's color distortion and brightness distortion to detect the candidate foreground pixels. The color distortion considers the vector's position in color space so that it can assemble the...

    Provided By Anna University

  • White Papers // May 2009

    Effect of Mobility and Traffic Flow on DSR Protocol in a Predefined Mobile Ad Hoc Network

    The increased used of bandwidth restricted multimedia applications over Mobile Ad hoc Networks (MANETs) create new challenges to routing protocols in terms of Quality of Service (QoS) requirements. To meet these requirements, the existing routing protocols should provide data transfer with minimal delay, packet loss and jitter. In the present...

    Provided By Anna University

  • White Papers // Jun 2009

    Energy Efficient Medium Access Control for Wireless Sensor Networks

    This paper aims to design energy efficient Medium Access Control (MAC) for IEEE 802.15.4 based Wireless Sensor Networks (WSN). This is achieved by replacing the currently existing common-range maximum transmission power with the concept of dynamic and adaptive transmission power control. Various parameters like Link Quality, Received Signal Strength, MAC...

    Provided By Anna University

  • White Papers // Jul 2009

    Mobility Impact, Timing Analysis and Repeatability Issues of DYMO Protocol in a Precise Mobile Ad Hoc Network

    Mobile ad hoc network is an emerging trend and it has to face many challenges and issues. QOS (Quality of service) is a challenging requirement in mobile ad hoc networks. QOS metrics such as bandwidth, delay, delay jitter, packet delivery fraction are some of the requirements in this field. The...

    Provided By Anna University

  • White Papers // Jul 2011

    Decentralized Dynamic Load Balancing and Intersection Trust in Mobile Ad Hoc Grids

    A mobile ad hoc network is an autonomous system connected through wireless links. It does not have any fixed infrastructure, and the mobile nodes in the network coordinate among themselves for communication. This network can be formed by heterogeneous mobile devices like laptops, PDAs, cell phones etc. Highly capable device...

    Provided By Anna University

  • White Papers // Jul 2011

    Distributed Adaptive Clustering Algorithm for Improving Data Accessibility in MANET

    Mobile Ad Hoc Network is a collection of mobile nodes forming an ad hoc network without the assistance of any centralized structures. There are many algorithms to improve data accessibility and reduce delay in MANETs. The basic idea is to distributively group mobile nodes with similar mobility pattern into a...

    Provided By Anna University

  • White Papers // May 2011

    Handover Performance Evaluation in WiFi/WiMax Networks Using M-SIP

    One of the most challenging issues in wireless and mobile networks is vertical handover when users roam between different access networks. In this paper a new approach named Mobile-SIP (M-SIP) is proposed for WiFi/WiMax handover in application layer. It introduces an excellent charging method during handover to support mobile operator...

    Provided By Anna University

  • White Papers // Jan 2011

    CARE Resource Broker: A Framework for Dynamic Grid Enabled Cluster of Virtual Machines

    Virtualization technology offers effective resource management mechanisms such as isolated, secure job scheduling, and utilization of computing resources to the possible extent. These features are quite helpful for dynamic provisioning of grid resources for high performance computing applications. Enabling these virtual machines as grid resources requires dynamic creation of virtual...

    Provided By Anna University

  • White Papers // Mar 2011

    Efficient Wavelet Based Image Compression Technique for Wireless Communication

    With phenomenal growth in wireless multimedia image communication, the issues need to handle are resource consumption and the quality of the image being transmitted in wireless channels. The resource consumptions indicated in most literatures are bandwidth and energy consumption. The strict constrains of Wireless Sensor Networks (WSN) on individual sensor...

    Provided By Anna University

  • White Papers // Jun 2009

    Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks

    Nodes in Mobile Ad Hoc NETwork (MANET) do not rely on a central infrastructure but relay packets originated by other nodes. Mobile ad hoc networks can work properly only if the participating nodes collaborate in routing and forwarding. For individual nodes it might be advantageous not to collaborate, though. In...

    Provided By Anna University

  • White Papers // Jul 2011

    Power Aware Routing for MANET Using On-Demand Multipath Routing Protocol

    Energy in mobile adhoc networks is of much important. Similarly shortest path from source to destination is also important for routing. To address these issues a routing protocol is proposed which gives an optimum between these issues. Power Aware Adhoc On-demand Multipath Distance Vector (PAAOMDV) is proposed to overcome the...

    Provided By Anna University

  • White Papers // May 2010

    Latency Optimized Data Aggregation Timing Model for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), the data aggregation schemes are extensively used to avoid the redundant transmission of correlated data from densely deployed sensor nodes. Even though, it enhances the network lifetime, it seriously suffers from the increased data delivery time. The high end-to-end delay experienced by the packets is...

    Provided By Anna University

  • White Papers // Mar 2010

    Throughput Enhancement in Scalable MANETs Using Proactive and Reactive Routing Protocols

    In MANET routing is an essential activity that connects a call from source to destination in telecommunication networks and also need to be essential in architecture, design and operation of networks. Routing with Scalable performance is one of the key challenges in deploying large scale Mobile Ad hoc Networks. In...

    Provided By Anna University

  • White Papers // Jul 2011

    RTOS Based Secure Shortest Path Routing Algorithm in Mobile Ad-Hoc Networks

    Increase of number of the nodes in the wireless computing environment leads to different issues like power, data rate, QoS, simulators and security. Among these the security is the peak issue faced by most of the wireless networks. Especially networks without having a centralized system (MANETS) is facing severe security...

    Provided By Anna University

  • White Papers // May 2010

    Analysis of Open Source Drivers for IEEE 802.11 WLANs

    The purpose of this paper is to analyze the open source IEEE 802.11 Wireless Local Area Network (WLAN) stack implementation for further enhancement and implementations. The authors discuss the IEEE 802.11 WLAN implementation in the latest Linux kernel. This includes a functional breakdown of the driver and the overall flow...

    Provided By Anna University

  • White Papers // Feb 2010

    A Frame Aggregation Scheduler for IEEE 802.11n

    Wireless Local Area Networks (WLANs) based on the IEEE 802.11 standard are widely deployed in the home and enterprise segments across the globe. The IEEE 802.11n is the latest amendment that aims to achieve throughput higher than 100 Mbps at the Medium Access Control (MAC) layer. It defines two frame...

    Provided By Anna University