Association of Computer Electronics and Electrical Engineers

Displaying 1-15 of 15 results

  • White Papers // Jan 2014

    Priority based K-Erlang Distribution Method in Cloud Computing

    In this paper, the authors have proposed a priority based service time distribution method using Erlang Distribution for K-phases. The process of entering into the cloud is typically based on the priority of the service and form a queue. Each user needs to wait until the current user is being...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Cloud Security and Data Integrity with Client Accountability Framework

    The cloud based services provide much efficient and seamless ways for data sharing across the cloud. The fact that the data owners no longer possess data makes it very difficult to assure data confidentiality and to enable secure data sharing in the cloud. Despite of all its advantages this will...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    A Fuzzy Algorithm for Mining High Utility Rare Itemsets - FHURI

    Classical frequent itemset mining identifies frequent itemsets in transaction databases using only frequency of item occurrences, without considering utility of items. In many real world situations, utility of itemsets are based upon user's perspective such as cost, profit or revenue and are of significant importance. Utility mining considers using utility...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Trust Assessment Policy Manager in Cloud Computing - Cloud Service Provider's Perspective

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Reliability in compute cloud is an important aspect in Quality of Service (QoS) which needs to be addressed in order to foster the adoption of compute cloud. In today's integrated environment...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Enhancing Data Storage Security in Cloud Computing Through Steganography

    In cloud computing data storage is a significant issue because the entire data reside over a set of interconnected resource pools that enables the data to be accessed through virtual machines. It moves the application software's and databases to the large data centers where the management of data is actually...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Synchronization of the GPS Coordinates Between Mobile Device and Oracle Database System

    In this paper, the authors describe an architecture and implementation of module for acquiring a synchronization of GPS data between mobile device and central database system. The process of data exchange is inspired by SAMD algorithm. The paper sequentially presents a solution of individual system components. Special attention is paid...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2011

    A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank

    Fingerprint Identification is a widely used Biometric Identification mechanism. Up till now different techniques have been proposed for having satisfactory Fingerprint Identification. The widely used minutiae-based representation did not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures could not be completely characterized...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Communication by Whispers Paradigm for Short Range Communication in Cognitive Radio Networks Using Interference Based MAC Sensing for Opportunity Discovery

    With ever increasing demand for efficiency and increased throughput over the wireless domain, the authors have now reached a point where in a method for efficient utilization of the electromagnetic spectrum is in demand. Cognitive radio provides one with a way in which this demand could be catered, it does...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Optimize Flooding in Wireless Mesh Cloud

    The Wireless Mesh Network (WMN) is an emerging multi hop, heterogeneous, scalable, low cost, with easy maintenance robust network providing reliable service coverage. The architecture of WMNs is a connectionless - oriented, and consists of mesh routers and mesh clients. In this architecture, static mesh routers form the wireless backbone,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Context-Aware Intrusion Detection and Tolerance in MANETs

    Mobile Ad-hoc NETwork (MANET) is a decentralized network where each node will forward the data to other nodes. The major challenge in handling security in MANETs is that the network is not constant and thereby it is difficult to set a constant algorithm for detecting the intrusion. In this work,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Modified EPC Global Network Architecture of Internet of Things for High Load RFID Systems

    This paper proposes a flexible and novel architecture of Internet Of Things (IOT) in a high density and mobility environment. The authors' proposed architecture solves the problem of over-loading on the network by monitoring the total number of changed objects changing global location crossing the fringe boundaries rather than the...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Clouds Using the Concept of Application Metadata

    Cloud computing is an emerging computing paradigm. It aims to share data, resources and services transparently among users of a massive grid. Although the industry has started selling cloud-computing products, research challenges in various areas, such as architectural design, task decomposition, task distribution, load distribution, load scheduling, task coordination, etc....

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    FTTCP: Fault Tolerant Two-Level Clustering Protocol for WSN

    In this paper, the authors propose an agreement-based fault detection and recovery protocol for Cluster Head (CH) in Wireless Sensor Networks (WSNs) of two level cluster hierarchy. The aim of protocol is to accurately detect CH failure to avoid unnecessary energy consumption caused by a mistaken detection process. For this,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Performance Analysis and Development of an Efficient Routing Scheme for IEEE 802.16/WiMAX Mesh Networks

    A collision-free centralized scheduling algorithm for IEEE 802.16 WiMAX provides a mechanism for creations multi-hop mesh and high-quality wireless multimedia services which can be developed as a high speed broad band wireless network. In centralized scheduling for IEEE 802.16 mesh networks, all packets should be transported through the BS (Base...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks

    The mobile network that supports network mobility is an emerging technology. It is also referred as NEMO (NEtwork MObility). It is more appropriate for mobile platforms such as car, bus, train, air plane, etc. It is a great challenge to provide Quality of Service (QoS) in NEMO. QoS is a...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Optimize Flooding in Wireless Mesh Cloud

    The Wireless Mesh Network (WMN) is an emerging multi hop, heterogeneous, scalable, low cost, with easy maintenance robust network providing reliable service coverage. The architecture of WMNs is a connectionless - oriented, and consists of mesh routers and mesh clients. In this architecture, static mesh routers form the wireless backbone,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jul 2011

    A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank

    Fingerprint Identification is a widely used Biometric Identification mechanism. Up till now different techniques have been proposed for having satisfactory Fingerprint Identification. The widely used minutiae-based representation did not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures could not be completely characterized...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Modified EPC Global Network Architecture of Internet of Things for High Load RFID Systems

    This paper proposes a flexible and novel architecture of Internet Of Things (IOT) in a high density and mobility environment. The authors' proposed architecture solves the problem of over-loading on the network by monitoring the total number of changed objects changing global location crossing the fringe boundaries rather than the...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Context-Aware Intrusion Detection and Tolerance in MANETs

    Mobile Ad-hoc NETwork (MANET) is a decentralized network where each node will forward the data to other nodes. The major challenge in handling security in MANETs is that the network is not constant and thereby it is difficult to set a constant algorithm for detecting the intrusion. In this work,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Multilevel Hybrid Cognitive Load Balancing Algorithm for Private/Public Clouds Using the Concept of Application Metadata

    Cloud computing is an emerging computing paradigm. It aims to share data, resources and services transparently among users of a massive grid. Although the industry has started selling cloud-computing products, research challenges in various areas, such as architectural design, task decomposition, task distribution, load distribution, load scheduling, task coordination, etc....

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    FTTCP: Fault Tolerant Two-Level Clustering Protocol for WSN

    In this paper, the authors propose an agreement-based fault detection and recovery protocol for Cluster Head (CH) in Wireless Sensor Networks (WSNs) of two level cluster hierarchy. The aim of protocol is to accurately detect CH failure to avoid unnecessary energy consumption caused by a mistaken detection process. For this,...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    Performance Analysis and Development of an Efficient Routing Scheme for IEEE 802.16/WiMAX Mesh Networks

    A collision-free centralized scheduling algorithm for IEEE 802.16 WiMAX provides a mechanism for creations multi-hop mesh and high-quality wireless multimedia services which can be developed as a high speed broad band wireless network. In centralized scheduling for IEEE 802.16 mesh networks, all packets should be transported through the BS (Base...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2011

    Communication by Whispers Paradigm for Short Range Communication in Cognitive Radio Networks Using Interference Based MAC Sensing for Opportunity Discovery

    With ever increasing demand for efficiency and increased throughput over the wireless domain, the authors have now reached a point where in a method for efficient utilization of the electromagnetic spectrum is in demand. Cognitive radio provides one with a way in which this demand could be catered, it does...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Dec 2010

    A Quality of Service Strategy to Optimize Bandwidth Utilization in Mobile Networks

    The mobile network that supports network mobility is an emerging technology. It is also referred as NEMO (NEtwork MObility). It is more appropriate for mobile platforms such as car, bus, train, air plane, etc. It is a great challenge to provide Quality of Service (QoS) in NEMO. QoS is a...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Priority based K-Erlang Distribution Method in Cloud Computing

    In this paper, the authors have proposed a priority based service time distribution method using Erlang Distribution for K-phases. The process of entering into the cloud is typically based on the priority of the service and form a queue. Each user needs to wait until the current user is being...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Cloud Security and Data Integrity with Client Accountability Framework

    The cloud based services provide much efficient and seamless ways for data sharing across the cloud. The fact that the data owners no longer possess data makes it very difficult to assure data confidentiality and to enable secure data sharing in the cloud. Despite of all its advantages this will...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    A Fuzzy Algorithm for Mining High Utility Rare Itemsets - FHURI

    Classical frequent itemset mining identifies frequent itemsets in transaction databases using only frequency of item occurrences, without considering utility of items. In many real world situations, utility of itemsets are based upon user's perspective such as cost, profit or revenue and are of significant importance. Utility mining considers using utility...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Trust Assessment Policy Manager in Cloud Computing - Cloud Service Provider's Perspective

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources. Reliability in compute cloud is an important aspect in Quality of Service (QoS) which needs to be addressed in order to foster the adoption of compute cloud. In today's integrated environment...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Enhancing Data Storage Security in Cloud Computing Through Steganography

    In cloud computing data storage is a significant issue because the entire data reside over a set of interconnected resource pools that enables the data to be accessed through virtual machines. It moves the application software's and databases to the large data centers where the management of data is actually...

    Provided By Association of Computer Electronics and Electrical Engineers

  • White Papers // Jan 2014

    Synchronization of the GPS Coordinates Between Mobile Device and Oracle Database System

    In this paper, the authors describe an architecture and implementation of module for acquiring a synchronization of GPS data between mobile device and central database system. The process of data exchange is inspired by SAMD algorithm. The paper sequentially presents a solution of individual system components. Special attention is paid...

    Provided By Association of Computer Electronics and Electrical Engineers