Engg Journals Publications

Displaying 1-40 of 625 results

  • White Papers // Jun 2011

    A Study of Adaptive Replication Technique in Routing Time-Constrained Messages (VoIP) in MANET

    Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Priority Based Uplink Scheduler for IEEE 802.16 Networks

    IEEE 802.16, the standard for fixed, portable and mobile Broadband Wireless Access (BWA) systems, is promising to support different classes of traffic with Quality of Service (QoS). The Medium Access Control (MAC) protocol defines a wide variety of mechanisms for bandwidth allocation and QoS provision. However, the details of how...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    VoIP Over WMN: Effect of Packet Aggregation

    VoIP services are getting more and more popular day by day. In order to meet the users demand for such services irrespective of users location requires wide area wireless coverage .To this extent, wireless mesh networks have been considered as practical and inexpensive solution .In order to improve the performance...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Automatic Detection of Human and Energy Saving Based on Zigbee Communication

    This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize the proposed room architecture, the authors proposed and designed the Zigbee communication. Zigbee is a...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Security Management System for Oilfield Based on GSM Technology

    Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for oil theft, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Parent Siblings Oriented Tree Quorum Protocol

    In this paper, the authors are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical structure of tree on the set of copies of an object. The proposed protocol provides a...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Performance Evaluation and Optimization of DSR Routing Algorithm Over 802.11 Based Wireless Mesh Network

    DSR Protocol offers a very effective routing mechanism in Wireless Mesh Networks. But the performance deteriorates when network is subjected to large amount of traffic. In this paper the authors have proposed modifications in DSR protocol, wherein congestion in the network is controlled by reducing the RREQ packet retransmission by...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Development of Coalmine Safety System Using Wireless Sensor Network

    In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for the automatic real-time monitoring of coal mine. The application designs a monitoring system for coal...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Comparative Study of Attacks on AODV-Based Mobile Ad Hoc Networks

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. The security issue is becoming a major concern and bottleneck in the application of MANET....

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Survey on Optimistic Fair Digital Signature Exchange Protocols

    Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Impact Analysis of Recent DDoS Attacks

    In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Modified Route-Maintenance in AODV Routing Protocol Using Static Nodes in Realistic Mobility Model

    One of the popular wireless network architectures is Mobile Ad Hoc NETwork (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network that consists of nodes which are mobile in nature. Each node in the network acts as a...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Congestion Controlled Multipath Routing Algorithm Based on Path Survivability Factor

    Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Online Health Monitoring System Using Zigbee

    An on-line health monitoring of physiological signals of humans such as temperature and pulse using Zigbee is produced in this paper, by which the temperature and pulse of humans can be monitored from a distant location and some abnormalities can be easily indicated via SMS .The physiological measurements obtained from...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Globally Accessible List (GAL) Based Recovery Concept in Mobile Ad-Hoc Network

    A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology...

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Current Research Work on Routing Protocols for MANET: A Literature Survey

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Cloud Based Distributed Databases: The Future Ahead

    Fault tolerant systems are necessary to be there for distributed databases for data centers or distributed databases requires having fault tolerant system due to the higher data scales supported by current data centers. In a large distributed database usually data resides on servers which are dedicated servers having backups. Therefore,...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Survey of Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks

    In this survey paper, the authors discussed a lot of conventional protocols and their modification which includes energy efficiency with the importance of energy efficient routing protocols. They conclude that there is not a single protocol which can give the best performance in ad-hoc network. They have also discussed the...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks

    In this paper the performance of the proposed DLMT and CLMT algorithms are compared. These proposed algorithms tend to extend the node lifetime. Decentralized Lifetime Maximizing Tree (DLMT) features in nodes with higher energy to be chosen as data aggregating parents while Centralized Lifetime Maximizing Tree (CLMT) features with the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2010

    Minimizing End to End Delay by Power Aware Routing in Wireless Mobile Adhoc Network

    In this paper, the authors proposed an algorithm for joint power control and routing, along with cross layer interactions in wireless ad-hoc networks. The performance analysis expects that there will be a better improvement in end to end delay with this algorithm compared to existing DSR algorithm. To use congestion...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    QoS Parameter Analysis on AODV and DSDV Protocols in a Wireless Network

    Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV) routing protocol in mobile ad hoc...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    BER Analysis of Coded and Uncoded MIMO-OFDM System in Wireless Communication

    Alamouti's space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Novel Routing Attack in Mobile Ad Hoc Networks

    Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to Denial Of Service (DOS) attacks...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Cluster-ID Routing Scheme in Wireless Sensor Networks

    One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor network for nodes and network life. There are several existing routing protocols to solve this problem. LEACH (Low-Energy...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Analyzing Throughput of TCP in IEEE 802.11 Based Ad-Hoc Networks

    In order to allow programmers to follow conventional techniques while creating applications that uses an internet, software in the internet must provide the same semantics as a conventional computer system, it means it must guarantee reliable communication. Transport protocol provides reliability, which is fundamental for all the applications. The Transmission...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Refined Anchor Free Localisation for Wireless Sensor Monitoring in Wireless Sensor Networks

    Localisation is required for many ad-hoc sensor network applications. In this paper, the authors look at the limitations of the existing localisation technique, Anchor Free Localisation (AFL) with regards to coping with non-uniform anchor distributions and errors in ranging information. They present a refined approach called Refined Anchor Free Localisation...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    Comparison and Analysis of RREQ and RREP for Dynamic Wireless Network

    This paper compares and analyzes RREQ and RREP for wireless networks using Zigbee technology for transferring data between dynamically moving nodes. The system is simulated on Ptolemy 2 Visual Sense simulating tool, using power loss channel for 2, 4, 6, 8 number of composites nodes, with three different scenarios of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    An Improved Snoop for TCP Reno and TCP Sack in Wired-Cum-Wireless Networks

    TCP is the most widely used transport protocol originally designed for wired networks. But many experiments have shown that its performance is poor when used in wireless networks. Also improving its performance in wired-cum-wireless networks preserving the end-to-end nature of TCP is a difficult task. To address this issue, several...

    Provided By Engg Journals Publications

  • White Papers // May 2014

    A Novel Approach for Pattern Analysis From Huge Datawarehouse

    Due to the tremendous growth of data and large databases, efficient extraction of required data has become a challenging task. This paper proposes a novel approach for knowledge discovery from huge unlabeled temporal databases by employing a combination of HMM and K-means technique. The authors propose to recursively divide the...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Modeling Virtual Meetings within Software Engineering Environment

    As known, during software development there are many activities that need to be done by the project's stakeholders. These activities are typically carried out in a sequential or parallel form during the project's life time cycle. It is a common scenario to see project's stakeholders, such as managers, team leaders,...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    Review Paper on Web Service Security

    A web service is a software system that is designed to support machine to machine interoperable interaction of systems over a network. Web services provide a framework for system integration without depending on programming language and operating system. It is widely deployed in current distributed systems and has become the...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    A Study of Clone Detecting Techniques in Stationary and Mobile Wireless Sensor Network

    Mobile Wireless Sensor Network (MWSN) is one of the recently emerging areas in which mobility of sensor nodes play a major role. Sensor nodes are allowed to move freely and are allowed to communicate with each other without a need for fixed infrastructure. Sensor nodes are not equipped with tamper...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Multi-Constrained QoS Multicast Routing Based on the Genetic Algorithm for MANETs

    A wireless MANET is a collection of wireless mobile hosts that dynamically create a temporary network without a fixed infrastructure. The topology of the network may change unpredictably and frequently. Therefore, multicast routing in ad hoc networks is a very challenging problem. This paper proposes a multi-constrained QoS multicast routing...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Agent Based Simulation Model for Warning Messages Dissemination in a Vehicular Ad Hoc Network

    Since the safety on roads has become a main concern for both governments and car manufacturers in the last twenty years, number of applications into the domain of vehicular communication is proposed. Vehicular Ad hoc NETworks (VANETs) fall in this category. In this paper, the authors propose an agent based...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Purchase Decision for ATUR Broadband Network

    Along with the booming of telecommunication, Internet web has become a vital media in the current global communication and the communication quality of Internet has been emphasized. To the client user, the Internet ATUR (ADSL Transceiver Unit Remote) is the equipment they usually have to the extent of reliable quality....

    Provided By Engg Journals Publications

  • White Papers // Aug 2014

    An Extensive Study on the Future of Modeling in Software Development

    In recent years, software modeling realized much attention in the field of software research and development due to demonstrating the capability of decreases time and cost of software development and also improves overall quality of software development process in the form of understanding, communications, correctness, traceability, and developer productivity etc....

    Provided By Engg Journals Publications

  • White Papers // Aug 2014

    A Secured and Improved Dynamic ID Based Remote User Authentication Scheme Using Smart Card and Hash Function for Distributed Systems

    Authentication is a major concern for accessing remote service residing over on server in distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    A Comprehensive Review and Analysis on Object-Oriented Software Metrics in Software Measurement

    The software development is dynamic and is always undergoing major changes. Today a huge number of tools and methodologies are available for software development and software development refers to all activities that go into producing information system solution. System development activities consist of system analysis, modeling, design, implementation, testing and...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    Rebroadcasting for Routing Reduction Based Upon Neighbor Coverage in Ad Hoc Networks

    Cause of nodes high mobility in Mobile Ad-hoc NETworks (MANETs), there are frequent link breakages exist which escort to frequent route discoveries and path failures. The route discovery procedure cannot be ignored. In a route finding, broad casting is a primary and efficient data broadcasting methodology, where a cell phone...

    Provided By Engg Journals Publications