Engg Journals Publications

Displaying 1-40 of 525 results

  • White Papers // Oct 2014

    Iris Recognition Based on Subspace Analysis

    Biometrics deals with the uniqueness of an individual arising from their physiological or behavioral characteristics for the purpose of personal identification. Among many biometrics techniques, iris recognition is one of the most promising approached. This paper presents traditional subspace analysis method for iris recognition. Initially the eye images have been...

    Provided By Engg Journals Publications

  • White Papers // Oct 2014

    SEMU - An Adaptive Policy - Control Based Routing Approach to Provide Effective QoS Over Wireless Sensor Networks

    Error control mechanism carries vital importance in research aspects of Wireless Sensor Networks (WSNs) due to its limited energy constraints and minimal support for power communication. The survey and analysis provides a comprehensive comparison of FEC/ARQ and hybrid ARQ schemes in WSN. This paper proposes an adaptive QoS routing scheme...

    Provided By Engg Journals Publications

  • White Papers // Sep 2014

    Efficient Processing of XML Documents in Hadoop Map Reduce

    XML has dominated the enterprise landscape for fifteen years and still remains the most commonly used data format. Despite its popularity the usage of XML for \"Big data\" is challenging due to its semi-structured nature as well as rather demanding memory requirements and lack of support for some complex data...

    Provided By Engg Journals Publications

  • White Papers // Aug 2014

    A Secured and Improved Dynamic ID Based Remote User Authentication Scheme Using Smart Card and Hash Function for Distributed Systems

    Authentication is a major concern for accessing remote service residing over on server in distributed systems. It is difficult to remember different identities and passwords for users. In order to solve the flaws encountered in many remote user authentication schemes in multi-server environment, only authentic user login to the remote...

    Provided By Engg Journals Publications

  • White Papers // Aug 2014

    An Extensive Study on the Future of Modeling in Software Development

    In recent years, software modeling realized much attention in the field of software research and development due to demonstrating the capability of decreases time and cost of software development and also improves overall quality of software development process in the form of understanding, communications, correctness, traceability, and developer productivity etc....

    Provided By Engg Journals Publications

  • White Papers // Aug 2014

    End to End Delay Analytical Estimation of NoC With VBR Traffic

    Network-on-Chip (NoC) integrates real time application that requires strength performance guaranties, usually enforced by a tight upper bound on the maximum end-to-end delay. The complex and unpredictable nature of data traffic, initiate the use of modeling and analytical prediction. In this paper, a network calculus mathematical method is used for...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    A Comprehensive Review and Analysis on Object-Oriented Software Metrics in Software Measurement

    The software development is dynamic and is always undergoing major changes. Today a huge number of tools and methodologies are available for software development and software development refers to all activities that go into producing information system solution. System development activities consist of system analysis, modeling, design, implementation, testing and...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    Justified Cross-Site Scripting Attacks Prevention from Client-Side

    Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at a frightening rate. Web apps frequently make JavaScript code utilization that is entrenched into web pages to defend client-side behavior which is dynamic. This...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    Rebroadcasting for Routing Reduction Based Upon Neighbor Coverage in Ad Hoc Networks

    Cause of nodes high mobility in Mobile Ad-hoc NETworks (MANETs), there are frequent link breakages exist which escort to frequent route discoveries and path failures. The route discovery procedure cannot be ignored. In a route finding, broad casting is a primary and efficient data broadcasting methodology, where a cell phone...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    Data Warehouse Schema Evolution and Adaptation Framework Using Ontology

    Data warehouse systems aim at integrating data from multiple heterogeneous, distributed and autonomous data sources. Due to changing business needs the data warehouse systems are never meant to be static. Changes in the data source structure or business requirements would result in the evolution of data warehouse schema structure. When...

    Provided By Engg Journals Publications

  • White Papers // Jul 2014

    Association Rule Mining for Both Frequent and Infrequent Items Using Particle Swarm Optimization Algorithm

    In data mining research, generating frequent items from large databases is one of the important issues and the key factor for implementing association rule mining tasks. Mining infrequent items such as relationships among rare but expensive products is another demanding issue which has been shown in some recent studies. Therefore...

    Provided By Engg Journals Publications

  • White Papers // May 2014

    A Novel Approach for Pattern Analysis From Huge Datawarehouse

    Due to the tremendous growth of data and large databases, efficient extraction of required data has become a challenging task. This paper proposes a novel approach for knowledge discovery from huge unlabeled temporal databases by employing a combination of HMM and K-means technique. The authors propose to recursively divide the...

    Provided By Engg Journals Publications

  • White Papers // May 2014

    An Efficient Text Clustering Approach Using Affinity Propagation with Weight Modification

    Recently the text mining has emerged as one of the most important fields of data mining because of most of the searching in the web is done on the basis of provided text, also the increasing use of social web network uses the text as major component and extracting the...

    Provided By Engg Journals Publications

  • White Papers // May 2014

    Comparison of Novel Semi Supervised Text Classification using BPNN by Active Search with KNN Algorithm

    With the availability of huge amount of text in internet, news, institutes, organization etc. need of automatic text classification also increases. The proposed paper comprised to deal with the major challenge of getting labeled data for training in classifier, since the availability of labeled data is expensive, time consuming, it...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Framework for User Authenticity and Access Control Security over a Cloud

    Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Mining Recurrent Pattern Identification on Large Database

    Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining research and it is the first step in the analysis of data rising in a...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Modeling Virtual Meetings within Software Engineering Environment

    As known, during software development there are many activities that need to be done by the project's stakeholders. These activities are typically carried out in a sequential or parallel form during the project's life time cycle. It is a common scenario to see project's stakeholders, such as managers, team leaders,...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    An Ontology Framework For Context-Based Multilingual Document Retrieval

    In this paper the authors aim to present a multilingual ontology model for retrieving documents. This technique is based on context based multilingual translation. Though English is a common language in the world, at times there are situations where there is no chance in rural and remote places. For each...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    Review Paper on Web Service Security

    A web service is a software system that is designed to support machine to machine interoperable interaction of systems over a network. Web services provide a framework for system integration without depending on programming language and operating system. It is widely deployed in current distributed systems and has become the...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    A Study of Clone Detecting Techniques in Stationary and Mobile Wireless Sensor Network

    Mobile Wireless Sensor Network (MWSN) is one of the recently emerging areas in which mobility of sensor nodes play a major role. Sensor nodes are allowed to move freely and are allowed to communicate with each other without a need for fixed infrastructure. Sensor nodes are not equipped with tamper...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    A Scheduling Approach with Processor and Network Heterogeneity for Grid Environment

    Processor heterogeneity is an important issue in grid environment. In this paper, a list based task scheduling algorithm, called \"Critical Path Scheduling with T-level\" (CPST) for grid computing system is proposed. There are no. of scheduling algorithms such as HEFT use mean execution time based b-level for task priority and...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Multi-Constrained QoS Multicast Routing Based on the Genetic Algorithm for MANETs

    A wireless MANET is a collection of wireless mobile hosts that dynamically create a temporary network without a fixed infrastructure. The topology of the network may change unpredictably and frequently. Therefore, multicast routing in ad hoc networks is a very challenging problem. This paper proposes a multi-constrained QoS multicast routing...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Kuder-Richardson Coefficient Based Trust Mechanism for Service Discovery in MANETs

    Service discovery in mobile ad-hoc networks is highly crucial due to the lack of centralized infrastructure. Furthermore, varieties of services available through the network may require different levels of security. Thus, a need arises for formulating and deploying an efficient trust oriented service discovery mechanism distributed in each and every...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Methodological Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing offers a variety of dynamic flexible resources to expedite the processing of large scale tasks in pay-by-use manner to public. In that, resource distribution and the effective load balancing among the available resources in heterogeneous environment is a major concern. Load balancing is employed across different data centers...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of data access with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Conception of a Prototype to Validate a Maintenance Expert System

    Decision making is crucial for the life of many production plants. Good decision need the right information at the right time, and a deep knowledge of the system. This is especially true for older plants that are more prone to failures. Unfortunately, these systems are less rich of monitoring and...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    VLSI Implementation of Low Power High Speed ML MAP Processor Design for Dual Mode Binary Turbo Decoders

    This paper presents the Max Log Maximum a Posteriori (MAX Log MAP) architecture which influences maximum error correcting capacity and minimum hardware complexity. In Turbo decoding the design of Log MAP algorithm is complicated due to the exponential factor in the Log Likelihood Calculation. In this paper, a new architecture...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Agent Based Simulation Model for Warning Messages Dissemination in a Vehicular Ad Hoc Network

    Since the safety on roads has become a main concern for both governments and car manufacturers in the last twenty years, number of applications into the domain of vehicular communication is proposed. Vehicular Ad hoc NETworks (VANETs) fall in this category. In this paper, the authors propose an agent based...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Detection and Discrimination of DDoS Attacks from Flash Crowd Using Entropy Variations

    Internet is a worldwide network that combines millions local to global scope, private public, academics, business, optical network technologies, government networks. It carries an expandable range of information resources and services which lead to bulk exchange of traffic over the Internet every day. This excessive popularity creates some troubles in...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Characterization and Modeling of Uncertainty Intended for a Secured MANET

    Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Nov 2009

    Generic Web Services: A Step Towards Green Computing

    Software as a Service (SaaS) is a buzzword especially in the realm of Cloud Computing. One can reduce the number of applications deployed on the data-centers by using similar applications hosted by the SaaS providers. Thus, "Reusability" of a SaaS is a key-point of focus promoting the same code-base of...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    E-Commerce Security Using PKI Approach

    As a most popular business model, ECommerce provides a more convenient business mode and lower transaction cost. Currently Ecommerce security is still an obstacle in development of e-commerce. It is the need of the hour to construct a safe and effective transaction environment. Based on the relationship of e-commerce security...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    A Study of Adaptive Replication Technique in Routing Time-Constrained Messages (VoIP) in MANET

    Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Priority Based Uplink Scheduler for IEEE 802.16 Networks

    IEEE 802.16, the standard for fixed, portable and mobile Broadband Wireless Access (BWA) systems, is promising to support different classes of traffic with Quality of Service (QoS). The Medium Access Control (MAC) protocol defines a wide variety of mechanisms for bandwidth allocation and QoS provision. However, the details of how...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    VoIP Over WMN: Effect of Packet Aggregation

    VoIP services are getting more and more popular day by day. In order to meet the users demand for such services irrespective of users location requires wide area wireless coverage .To this extent, wireless mesh networks have been considered as practical and inexpensive solution .In order to improve the performance...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Automatic Detection of Human and Energy Saving Based on Zigbee Communication

    This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize the proposed room architecture, the authors proposed and designed the Zigbee communication. Zigbee is a...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Security Management System for Oilfield Based on GSM Technology

    Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for oil theft, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Parent Siblings Oriented Tree Quorum Protocol

    In this paper, the authors are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical structure of tree on the set of copies of an object. The proposed protocol provides a...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Survey on Optimistic Fair Digital Signature Exchange Protocols

    Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Impact Analysis of Recent DDoS Attacks

    In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Modified Route-Maintenance in AODV Routing Protocol Using Static Nodes in Realistic Mobility Model

    One of the popular wireless network architectures is Mobile Ad Hoc NETwork (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network that consists of nodes which are mobile in nature. Each node in the network acts as a...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Congestion Controlled Multipath Routing Algorithm Based on Path Survivability Factor

    Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Online Health Monitoring System Using Zigbee

    An on-line health monitoring of physiological signals of humans such as temperature and pulse using Zigbee is produced in this paper, by which the temperature and pulse of humans can be monitored from a distant location and some abnormalities can be easily indicated via SMS .The physiological measurements obtained from...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Globally Accessible List (GAL) Based Recovery Concept in Mobile Ad-Hoc Network

    A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Performance Evaluation and Optimization of DSR Routing Algorithm Over 802.11 Based Wireless Mesh Network

    DSR Protocol offers a very effective routing mechanism in Wireless Mesh Networks. But the performance deteriorates when network is subjected to large amount of traffic. In this paper the authors have proposed modifications in DSR protocol, wherein congestion in the network is controlled by reducing the RREQ packet retransmission by...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Development of Coalmine Safety System Using Wireless Sensor Network

    In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for the automatic real-time monitoring of coal mine. The application designs a monitoring system for coal...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Comparative Study of Attacks on AODV-Based Mobile Ad Hoc Networks

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. The security issue is becoming a major concern and bottleneck in the application of MANET....

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Current Research Work on Routing Protocols for MANET: A Literature Survey

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Cloud Based Distributed Databases: The Future Ahead

    Fault tolerant systems are necessary to be there for distributed databases for data centers or distributed databases requires having fault tolerant system due to the higher data scales supported by current data centers. In a large distributed database usually data resides on servers which are dedicated servers having backups. Therefore,...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Survey of Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks

    In this survey paper, the authors discussed a lot of conventional protocols and their modification which includes energy efficiency with the importance of energy efficient routing protocols. They conclude that there is not a single protocol which can give the best performance in ad-hoc network. They have also discussed the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2010

    Minimizing End to End Delay by Power Aware Routing in Wireless Mobile Adhoc Network

    In this paper, the authors proposed an algorithm for joint power control and routing, along with cross layer interactions in wireless ad-hoc networks. The performance analysis expects that there will be a better improvement in end to end delay with this algorithm compared to existing DSR algorithm. To use congestion...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    QoS Parameter Analysis on AODV and DSDV Protocols in a Wireless Network

    Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV) routing protocol in mobile ad hoc...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    BER Analysis of Coded and Uncoded MIMO-OFDM System in Wireless Communication

    Alamouti's space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Novel Routing Attack in Mobile Ad Hoc Networks

    Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to Denial Of Service (DOS) attacks...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Cluster-ID Routing Scheme in Wireless Sensor Networks

    One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor network for nodes and network life. There are several existing routing protocols to solve this problem. LEACH (Low-Energy...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Analyzing Throughput of TCP in IEEE 802.11 Based Ad-Hoc Networks

    In order to allow programmers to follow conventional techniques while creating applications that uses an internet, software in the internet must provide the same semantics as a conventional computer system, it means it must guarantee reliable communication. Transport protocol provides reliability, which is fundamental for all the applications. The Transmission...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Refined Anchor Free Localisation for Wireless Sensor Monitoring in Wireless Sensor Networks

    Localisation is required for many ad-hoc sensor network applications. In this paper, the authors look at the limitations of the existing localisation technique, Anchor Free Localisation (AFL) with regards to coping with non-uniform anchor distributions and errors in ranging information. They present a refined approach called Refined Anchor Free Localisation...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    Comparison and Analysis of RREQ and RREP for Dynamic Wireless Network

    This paper compares and analyzes RREQ and RREP for wireless networks using Zigbee technology for transferring data between dynamically moving nodes. The system is simulated on Ptolemy 2 Visual Sense simulating tool, using power loss channel for 2, 4, 6, 8 number of composites nodes, with three different scenarios of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    An Improved Snoop for TCP Reno and TCP Sack in Wired-Cum-Wireless Networks

    TCP is the most widely used transport protocol originally designed for wired networks. But many experiments have shown that its performance is poor when used in wireless networks. Also improving its performance in wired-cum-wireless networks preserving the end-to-end nature of TCP is a difficult task. To address this issue, several...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks

    In this paper the performance of the proposed DLMT and CLMT algorithms are compared. These proposed algorithms tend to extend the node lifetime. Decentralized Lifetime Maximizing Tree (DLMT) features in nodes with higher energy to be chosen as data aggregating parents while Centralized Lifetime Maximizing Tree (CLMT) features with the...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    Developing a Mobile Adaptive Test (MAT) in an M-Learning Environment for Android Based 3G Mobile Devices

    M-Learning (e-Learning through mobile device) is gaining its importance worldwide among the Learning Community owing to the ubiquitous and powerful computing nature of the Mobile Devices. In an M-Learning environment, Student Assessment and Evaluation of their knowledge acquisition is a vital factor. Adaptive Testing helps the instructor to obtain an...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Web Based 'C' IDE: Approach

    A Web based environment has been designed to execute C programs without explicitly installing any compilers on the machine, thus addressing the concerns of portability and accessibility. The environment runs on a Linux server, uses password authentication and provides each user with separate project directories to store all his programs....

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Tracing Real Time Location of a Friend in Mobile System

    The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, and mobile robots that work among people. The robustness of the system will be able...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    MSMET: A Modified & Secure Multilanguage Encryption Technique

    Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Multilanguage cryptography, an advancement of classical cryptography, may evolve as a choice of classical cryptography lovers seeking a better security. The authors proposed an algorithm in Multilanguage approach, which generates different...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Integrated Model for Software Usability

    In recent years, the usability of software systems has been recognized as an important quality factor. Many definitions and models of usability have been given so far but they are brief and informal. Most of these models also fail to cover all of the aspects of usability and are not...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    A Framework for Extracting Information From Web Using VTD-XML's Xpath

    The exponential growth of WWW (World Wide Web) is the cause for vast pool of information as well as several challenges posed by it, such as extracting potentially useful and unknown information from WWW. Many websites are built with HTML, because of its unstructured layout, it is difficult to obtain...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes communicating with each other using multi-hop wireless. One of the main challenges of MANET is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. A variety of routing protocols have...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Optimization of Rectangular Microstrip Antenna Using Radial Basis Function Neural Network

    The mobile communication systems usually require a portable wireless antenna size in order to meet as requirement of mobile units. Microstrip patch antenna is one of the best suitable antennas for mobile communication due to its attractive features of low profile, light weight and easy fabrication. In general, it has...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    A Parallel Access Method for Spatial Data Using GPU

    Spatial Access Methods (SAMs) are used for information retrieval in large spatial databases. Many of the SAMs use sequential tree structures to search the result set of the spatial data which are contained in the given query region. In order to improve performance for the SAM, this paper proposes a...

    Provided By Engg Journals Publications