Engg Journals Publications

Displaying 1-40 of 625 results

  • White Papers // Nov 2009

    Generic Web Services: A Step Towards Green Computing

    Software as a Service (SaaS) is a buzzword especially in the realm of Cloud Computing. One can reduce the number of applications deployed on the data-centers by using similar applications hosted by the SaaS providers. Thus, "Reusability" of a SaaS is a key-point of focus promoting the same code-base of...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    A Study of Adaptive Replication Technique in Routing Time-Constrained Messages (VoIP) in MANET

    Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Priority Based Uplink Scheduler for IEEE 802.16 Networks

    IEEE 802.16, the standard for fixed, portable and mobile Broadband Wireless Access (BWA) systems, is promising to support different classes of traffic with Quality of Service (QoS). The Medium Access Control (MAC) protocol defines a wide variety of mechanisms for bandwidth allocation and QoS provision. However, the details of how...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    VoIP Over WMN: Effect of Packet Aggregation

    VoIP services are getting more and more popular day by day. In order to meet the users demand for such services irrespective of users location requires wide area wireless coverage .To this extent, wireless mesh networks have been considered as practical and inexpensive solution .In order to improve the performance...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Automatic Detection of Human and Energy Saving Based on Zigbee Communication

    This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize the proposed room architecture, the authors proposed and designed the Zigbee communication. Zigbee is a...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Security Management System for Oilfield Based on GSM Technology

    Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for oil theft, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Parent Siblings Oriented Tree Quorum Protocol

    In this paper, the authors are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical structure of tree on the set of copies of an object. The proposed protocol provides a...

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Current Research Work on Routing Protocols for MANET: A Literature Survey

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Modified Route-Maintenance in AODV Routing Protocol Using Static Nodes in Realistic Mobility Model

    One of the popular wireless network architectures is Mobile Ad Hoc NETwork (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network that consists of nodes which are mobile in nature. Each node in the network acts as a...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Congestion Controlled Multipath Routing Algorithm Based on Path Survivability Factor

    Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Online Health Monitoring System Using Zigbee

    An on-line health monitoring of physiological signals of humans such as temperature and pulse using Zigbee is produced in this paper, by which the temperature and pulse of humans can be monitored from a distant location and some abnormalities can be easily indicated via SMS .The physiological measurements obtained from...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Globally Accessible List (GAL) Based Recovery Concept in Mobile Ad-Hoc Network

    A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Performance Evaluation and Optimization of DSR Routing Algorithm Over 802.11 Based Wireless Mesh Network

    DSR Protocol offers a very effective routing mechanism in Wireless Mesh Networks. But the performance deteriorates when network is subjected to large amount of traffic. In this paper the authors have proposed modifications in DSR protocol, wherein congestion in the network is controlled by reducing the RREQ packet retransmission by...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Survey on Optimistic Fair Digital Signature Exchange Protocols

    Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Comparative Study of Attacks on AODV-Based Mobile Ad Hoc Networks

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. The security issue is becoming a major concern and bottleneck in the application of MANET....

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Impact Analysis of Recent DDoS Attacks

    In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Development of Coalmine Safety System Using Wireless Sensor Network

    In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for the automatic real-time monitoring of coal mine. The application designs a monitoring system for coal...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    E-Commerce Security Using PKI Approach

    As a most popular business model, ECommerce provides a more convenient business mode and lower transaction cost. Currently Ecommerce security is still an obstacle in development of e-commerce. It is the need of the hour to construct a safe and effective transaction environment. Based on the relationship of e-commerce security...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Survey of Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks

    In this survey paper, the authors discussed a lot of conventional protocols and their modification which includes energy efficiency with the importance of energy efficient routing protocols. They conclude that there is not a single protocol which can give the best performance in ad-hoc network. They have also discussed the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Cloud Based Distributed Databases: The Future Ahead

    Fault tolerant systems are necessary to be there for distributed databases for data centers or distributed databases requires having fault tolerant system due to the higher data scales supported by current data centers. In a large distributed database usually data resides on servers which are dedicated servers having backups. Therefore,...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks

    In this paper the performance of the proposed DLMT and CLMT algorithms are compared. These proposed algorithms tend to extend the node lifetime. Decentralized Lifetime Maximizing Tree (DLMT) features in nodes with higher energy to be chosen as data aggregating parents while Centralized Lifetime Maximizing Tree (CLMT) features with the...

    Provided By Engg Journals Publications

  • White Papers // Jan 2012

    An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks

    Routing is one of the most significant challenges in Vehicular ad hoc networks and is critical for the basic network operations. Nodes (vehicles) in a Vehicular ad hoc network are allowed to move in an uncontrolled manner. Such node mobility results in a highly dynamic network with rapid topological changes....

    Provided By Engg Journals Publications

  • White Papers // Jan 2012

    Reconfigurable Co-Processor for High Performance Discrete Wavelet Transform

    Wavelet transforms have proven to be useful tool for several signal processing applications, including image and video compressions, image segmentation, speech synthesis and telecommunication. With the continuous increase in the use of internet and wireless devices, wavelet transform become more popular over traditional Fourier and cosine transforms in DSP applications...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Biometric Template Security Using Invisible Watermarking With Minimum Degradation in Quality of Template

    In this paper, the authors present an approach to enhance the Biometric Template Security by using Invisible Watermarking. For embedding the watermark in the Biometric Template, they used Parity Checker Method. The use of Parity Checker Method ensures that the change in Biometric Template should be minimum. The watermark that...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    Task Scheduling Algorithm to Reduce the Number of Processors Using Merge Conditions

    Some task scheduling algorithms generate the shortest schedule, when its input DAG satisfies a specified condition. Among those scheduling algorithms, TDS algorithm proposed a DAG condition where allocation of two parent tasks of a join task in the same processor cause longer schedule length than allocation in different processors, and...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    An Efficient Approach for Routing in Wireless Ad Hoc Network Using Artificial Intelligence

    MANETs are the set of small, low infrastructure communication setup that operates by consuming the energy of batteries. Thus, it is very much important for MANETs to perform efficiently. For efficient transmission, routing is of much concerned and should be performed intelligently. For this, artificial intelligence can be used to...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Density Determination in Mobile Network Using Clustering Classification

    The quality service in the mobile network is achievable via expanding or sharing the existing mobile infrastructure. The expandability or share ability of the mobile network is to be determined through some valuable measures based on its utilization on cluster basis. Here, the cluster denotes a specific region of the...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    On Some Security Issues in Pervasive Computing - Light Weight Cryptography

    Pervasive Computing Environment is a world where technologies fadeout into the background. The technology is invisible to the user and he is least distracted by the technology. This paper tries to focus on the issues of pervasive computing and reveals the security issues in pervasive computing. The authors try to...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    Cooperative Communications: A New Trend in the Wireless World

    This Wireless channel while offering independence of movement also introduces un-reliability in the messages received at the destination. Various strategies have been introduced so far to mitigate the effects of the channel on the message received. In this paper, the authors give an introductory overview of cooperative communications, a new...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    A Bit Level Session Based Encryption Technique to Enhance Information Security

    In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files. BST consider the plain text (i.e., the input file) as binary string with finite...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Color Image Segmentation for Satallite Images

    This paper introduces efficient and fast algorithms for unsupervised image segmentation, using low-level features such as color, applied on satellite images. With the increase in spatial resolution of satellite imagery, the image segmentation technique for generating and updating geographical information are becoming more and more important. The present paper describes...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Digital Logic Embedding Using Single Row

    The authors present a technique to improve embedding capacity of Image using digital logic in this paper. They have applied digital logic operations on two equal halves of an image row to derive the hidden information. They have also compared the change in image using proposed technique and digital logic...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Interaction Between Software Engineering and Artificial Intelligence-A Review

    Software engineering and artificial intelligence is the two field of the computer science. During the last decades, the disciplines of Artificial Intelligence and Software Engineering have developed separately without the much exchange of research outcomes. However, both fields of computer science have different characteristics, benefits and limitations. This statement opens...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    An Analysis of Multi-Hop Wireless Network Routing Protocols for Mobile Nodes

    In Wireless Configuration, multiple nodes are distributed through out the Network and the nodes have mobile characteristics. The network topology changes time to time because the nodes do not have any static set up. That is wireless mobile networks are infrastructure less distributed system. Depending upon the requirement, the mobile...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Energy Efficient Adaptive Clustering for Heterogeneous Sensor Networks With Power Control

    Wireless sensor networks are energy constraint battery powered sensing, computing and communication infrastructure. Sensor nodes are randomly deployed and organized as clusters, and each node is responsible for transmitting the data to its cluster head. Most of the existing sensor networks focus on homogeneous and most of the existing clustering...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    A Probabilistic Approach of Coverage Prediction in Mobile Ad Hoc Networks

    A fundamental issue arising in Mobile Ad-hoc NETworks (MANETs) is the selection of the optimal path between any two nodes. It's very difficult to select of optimal path due to different factors affects the stability of the path. Such as mobility, coverage area, path loss, fading, energy level of the...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Analysis of Maintainability Models for Object Oriented System

    There is always has been a demand to provide efficient and effective high quality software. There are various maintainability objects to provide better maintainability. The quality of good software design heavily effective the quality of software. One of the claimed advantages of object-oriented paradigm is ease of maintenance. This paper...

    Provided By Engg Journals Publications

  • White Papers // Dec 2011

    Performance Evaluation of Algorithms Using a Distributed Data Mining Frame Work Based on Association Rule Mining

    Numerous current data mining tasks can be implemented effectively only in a distributed data mining. Thus, distributed data mining has achieved significant importance in the last decade. The proposed distributed data mining application framework, is a data mining tool. This framework aims at developing an efficient association rule mining tool...

    Provided By Engg Journals Publications

  • White Papers // Nov 2011

    Comparative Study on Relational Data Sets and XML Data Sets in J2EE System

    In the real world extracting information entirely depends up on the type of the information, the type of the structures used to maintain the information and the type of the application programs used. Most commonly available information is in the form of text; most of the systems use relational database...

    Provided By Engg Journals Publications