Engg Journals Publications

Displaying 1-40 of 503 results

  • White Papers // Apr 2014

    Framework for User Authenticity and Access Control Security over a Cloud

    Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Mining Recurrent Pattern Identification on Large Database

    Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining research and it is the first step in the analysis of data rising in a...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    An Ontology Framework For Context-Based Multilingual Document Retrieval

    In this paper the authors aim to present a multilingual ontology model for retrieving documents. This technique is based on context based multilingual translation. Though English is a common language in the world, at times there are situations where there is no chance in rural and remote places. For each...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of data access with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Conception of a Prototype to Validate a Maintenance Expert System

    Decision making is crucial for the life of many production plants. Good decision need the right information at the right time, and a deep knowledge of the system. This is especially true for older plants that are more prone to failures. Unfortunately, these systems are less rich of monitoring and...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    VLSI Implementation of Low Power High Speed ML MAP Processor Design for Dual Mode Binary Turbo Decoders

    This paper presents the Max Log Maximum a Posteriori (MAX Log MAP) architecture which influences maximum error correcting capacity and minimum hardware complexity. In Turbo decoding the design of Log MAP algorithm is complicated due to the exponential factor in the Log Likelihood Calculation. In this paper, a new architecture...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Kuder-Richardson Coefficient Based Trust Mechanism for Service Discovery in MANETs

    Service discovery in mobile ad-hoc networks is highly crucial due to the lack of centralized infrastructure. Furthermore, varieties of services available through the network may require different levels of security. Thus, a need arises for formulating and deploying an efficient trust oriented service discovery mechanism distributed in each and every...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Methodological Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing offers a variety of dynamic flexible resources to expedite the processing of large scale tasks in pay-by-use manner to public. In that, resource distribution and the effective load balancing among the available resources in heterogeneous environment is a major concern. Load balancing is employed across different data centers...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Detection and Discrimination of DDoS Attacks from Flash Crowd Using Entropy Variations

    Internet is a worldwide network that combines millions local to global scope, private public, academics, business, optical network technologies, government networks. It carries an expandable range of information resources and services which lead to bulk exchange of traffic over the Internet every day. This excessive popularity creates some troubles in...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Characterization and Modeling of Uncertainty Intended for a Secured MANET

    Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    A Novel Biometric System for Person Recognition Using Palm Vein Images

    The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, the authors present a new approach for the personal identification using palm vein images. This paper attempts to...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Mining Weighted Association Rule Using FP - Tree

    The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same significance without assigning their weight within a transaction or record. This paper proposed method gives importance for the...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Cloud Computing: Securing Client Data Storage

    Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with distributed cloud environment, which can be viewed as techniques wherever program developers can share distributed resources with better security. This paper...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Towards a Collaborative Learning Process Based on the Hybrid Cloud Computing and Web 2.0 Tools

    In this paper, the authors propose an online collaborative learning process composed of three iterative steps which mix the advantages of hybrid cloud computing, web 2.0 tools and the online questionnaire to improve the quality of the educational content of the course in the classroom. Indeed, it consists of transporting...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Elastic Calculator : A Mobile Application for Windows Mobile Using Mobile Cloud Services

    Cloud computing is highly significant in this era as it always shows a way to increase the capacity or to add an additional features on the go and also it is worthy to extend these services to mobile devices. It is proposed to design and implement elastic calculator for mobile...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Resource Provisioning Using Batch Mode Heuristic Priority with Round Robin Scheduling

    Million numbers of these users tries to access the data in different type of applications like online shopping etc., which tends to increase the load on a single server. Increase of load on a server results in reduction of throughput and it leads to a strong need of developing and...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Database Synchronization of Mobile-Build by Using Synchronization Framework

    In this paper, the authors propose synchronization of mobile database with server database using Microsoft synchronization framework. It is a platform for data synchronization developed by Microsoft which is used to synchronize multiple data stores. The sync framework lists the each item in a data store which was recognized by...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Mining on Car Database Employing Learning and Clustering Algorithms

    In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the known learning algorithms used are Naive Bayesian (NB) and SMO (Self-Minimal-Optimization). Thus the following two learning algorithms are used on a Car review database and thus...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Study and Constructing RDF Model for a Well Formatted Valid XML Document

    In recent years, semantic web is one of the technologies to make the WWW as machine understandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (web) resources. The RDF data model can be represented as entity-relationship or class diagrams, as it are based upon...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Web Page Segmentation for Small Screen Devices Using Tag Path Clustering Approach

    The web pages breathing these days are developed to be displayed on a desktop PCs and so viewing them on mobile web browsers is extremely tough. Since mobile devices have restricted resources, small screen device users need to scroll down and across the complicated sites persistently. To address the problem...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches

    In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques to detect fraud at the earliest opportunity to protect business and their shareholders, customers and employees. This paper surveyed different...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Ternary Hierarchical Clustering with Data De-Duplication in Sensor Networks

    Wireless Sensor Network (WSN) is resource constrained application specific ad-hoc networks. All the previous works have concentrated on the power aware techniques such as data aggregation, coordination of node operations for effective routes and query processing etc. All these techniques have helped to collect and communicate the field data of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Fingerprint Verification System Using Support Vector Machine

    Efficient fingerprint verification system is needed in many places for personal identification to access physical facilities, information etc. This paper proposes robust verification system based on features extracted from human fingerprints and a pattern classifier called Support Vector Machine (SVM). Three set of features are fused together and passed to...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection and Avoidance of SQL Injection Attack in Multi-Tier Web Based Application

    In this paper, the authors present SQL injection attack using stored procedure. In SQL injection attack, an attacker might deliver malicious SQL query segments as user input which could effect in a different database request. Using SQL injection attacks, an attacker might thus obtain and modify confidential information. An attacker...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    A Novel Approach for Software Implementation of Graphical Authentication Methodology

    The conventional method of authentication requires the user to remember a text based password which he enters in order to prove his legitimacy. Since security cannot be compromised, such passwords are usually lengthy and complicated else they would be cracked easily with various password hacking techniques. The user thus finds...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection & Classification of Internet Intrusion Based on the Combination of Random Forest and Naive Bayes

    The Use of internet renders a network packets susceptible to attacks ranging from passive eavesdropping to active impersonation, message replay and message distortion. There is no clear description as to what packets can be considered normal or abnormal. If the intrusions are not detected at the appropriate level, the loss...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Wireless Sensor Network - A Survey

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Secure Tracking and Transport System Using RWP and GPS

    In the present era where technology has become a part of the people life, every day new applications are developed in every field to serve mankind. Many applications have been developed using GPS (Global Positioning System) such as aquatic and spacecraft routing, surveying and mapping, precise time reference etc. GPS...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Securing MANET From Blackhole and Wormhole Attacks

    Mobile ad-hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV (Ad-hoc On-demand Distance Vector routing protocol). Black hole...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    E-RIHT: Enhanced Hybrid IP Traceback Scheme With 16-Bit Marking Field

    Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    PAPR Reduction in OFDM Using Partial Transmit Sequence (PTS)

    In recent years, OFDM has gained a lot of interest in diverse-digital communication applications. This has been due to its favorable properties like high spectral efficiency and robustness to channel fading. Some of the major drawbacks in OFDM are its high Peak-to-Average-Power Ratio (PAPR) of the transmitted signals and the...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Fuzzy Modelling of a Network Denial of Service (DOS) Attack Phenomenon

    This paper presents the fuzzy modeling of a network Denial of Service (DoS) attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic approach as well as an improved mechanism for generating the fuzzy inference rules were outlined. Further, the paper discusses the...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Novel Approach for Resource Discovery Using Random Projection on Cloud Computing Environments

    Cloud computing offers different type's utilities to the IT industries. Generally the resources are scattered throughout the clouds. It has to enable the ability to find different resources are available at clouds, This again an important criteria of distributed systems. This paper investigates the problem of locating resources which is...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Practical System for Querying Encrypted Data on the Cloud

    This paper proposes, compares and analyses query optimization techniques to securely query encrypted databases. Such querying capability is becoming increasingly relevant as individuals and enterprises move their data to the cloud. The schemes discussed delve into various design issues like speed, scalability and efficiency that are encountered in the context...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Levels of Security Issues in Cloud Computing

    Now-a-days, cloud computing is booming in most of the IT industry. Most of the organizations are moving to cloud computing due to various reasons. It provide elastic architecture accessible through internet and also it eliminate the setting up of high cost computing infrastructure for the IT based solutions and services....

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Deploying a Single or a Double Cluster Head Particle Swarm Optimization Technique Based on WSN Scenarios

    Designing a WSN involves taking into account two most important design criterions. One is achieving the energy optimization and other is enhancing the network longevity. Particle Swarm Optimization (PSO) technique is an efficient protocol which is capable of achieving these deign goals. Now PSO algorithm can be designed either having...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Improving Frequent Link Failure Detection in VANET

    VANET technology integrates wireless cellular and ad hoc for seamless connectivity between vehicles. Vehicle Ad-hoc NETworks (VANETs) are systems that allow vehicles to communicate with each other. Wireless-vice can send information to nearby vehicles, and messages can be sent from one vehicle to another, so that the information can be...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Handover Optimization With User Mobility Prediction for Femtocell-Based Wireless Networks

    Prediction of user mobility can assist resource and mobility management of wireless and mobile networks by optimizing handover execution, resource utilization, and so on. There have been extensive studies on mobility prediction for handovers between macrocells but little work for femtocell based networks yet due to their complicated characteristics. This...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Toward Secure Data Sharing Protocols for Avoiding Global Eavesdropper in WSN

    While transformation of the data between communications system there is need for confidentiality of content and location. In existing work only capable of preserving the content and protection on a limited portion of the network at a time. This paper focuses on provision of protecting location against a global eavesdropper....

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Intelligent Intrusion Detection for Detecting Unauthorized Malware Over the Network

    Monitoring Internet traffic is critical in order to acquire a good understanding of threats and in designing efficient security systems. It is the most important issue to monitor the traffic in internet and also in designing efficient security systems. Honeypot is one of the security tools for gathering intelligence of...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Energy Efficient Cluster Head Selection for Faulttolerant Routing in MANET

    Recent advances in Mobile Ad hoc NETwork (MANET) have led to many new techniques specifically designed for MANET where energy awareness is an essential consideration. In MANET, clustering is a key routing technique used to reduce energy consumption. The feasibility of a clustering method can be primarily determined by the...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Security Vulnerabilities in Web Application - An Attack Perspective

    Security is the essential and important topic in web applications. The choice of communication made the web technology an essential one in the environment. The importance of web application and its security increasing day by day, but traditional networks fails to provide security for web application. This paper discuss about...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Design a Quadband Frequencies Microstrip Patch Antenna With Double CShaped Slot

    A quadband frequencies microstrip square patch antenna with double C-shaped slot at the patch is proposed in this paper. First, a rectangular shaped patch antenna is designed for 2.40 GHz frequency (WLAN application) with narrow bandwidth of 67 MHz (operate better than - 10 dB between 2.368 GHz and 2.435...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Review on Monitoring Systems of the Road Network

    The network monitoring is a way to detect quickly and effectively all problems having an impact on the road network and to evaluate them in a structured way. It also helps to allocate resources on the basis of priority in order to address, in timely, the urgent situations and to...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Survey on VANET Intrusion Detection Systems

    In recent years, the security issues on Vehicular Ad hoc NETworks (VANETs) have become one of the primary concerns. The VANET is inherently very vulnerable to attacks than wired network because it is characterized by high mobility, shared wireless medium and the absence of centralized security services offered by dedicated...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Parametric Study on the Compact G-Shaped Monopole Antenna for 2.4 GHz and 5.2 GHz Application

    This paper describes the design of a compact printed microstrip G-shaped monopole antenna for Wireless Local Area Network (WLAN application). The antenna has G-shaped resonating element which is designed for the two resonance frequencies at 2.4GHz and 5.2GHz respectively, which are the operating bands for WLAN application. The antenna is...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Phase-Induced Intensity Noise Reduction with Improved Group Velocity Dispersion Tolerance in SAC-OCDMA Systems

    The demand for efficient optical communication systems has fuelled considerable research in developing techniques for eradicating Phase-induced Intensity Noise (PIIN) in Spectral-Amplitude Coding Optical Code-Division Multiple-Access (SAC-OCDMA). This paper investigates the use of modified-AND subtraction detection technique to mitigate PIIN in SAC-OCDMA systems. The simulation results show that the modified-AND...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Partition in Mobile Adhoc Network with Mobility-A New Approach for Effective Use of Fast Ip Address Autoconfiguration

    A mobile ad hoc network is a collection of mobile nodes in which a pair of nodes communicates by sending messages either over a direct wireless link, or over a sequence of wireless links including one or more intermediate nodes. Only pairs of nodes that lie within one another's transmission...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Design of Detection Engine for Wormhole Attack in Adhoc Network Environment

    Ad hoc network is a collection of nodes that are capable to form dynamically a temporary network without the support of any centralized fixed infrastructure. There is no central controller to determine the reliable & secure communication paths in Mobile Ad hoc network. Each node in the Ad hoc network...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    ORAT for Green Cloud Computing

    As the IT trade progress towards game-changing expertise, a cloud Eco-system is gradually increasing in the country with expertise corporation ramping up employing and guiding for cloud computing. An accomplishment of green IT is probable to assist an organization in several ways like operating cost, stakeholder value, sustainability, employee morale...

    Provided By Engg Journals Publications

  • White Papers // Dec 2012

    Study of Data Mining Approach for Mobile Computing Environment

    Efficient data mining techniques are required to discover useful information and knowledge. This is due to the effective involvement of computers and the improvement in Database Technology which has provided large data. The mobile data allocation scheme is proposed such that the data are replicated statically for traditional Databases' for...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    Survey on Security, Storage, and Networking of Cloud Computing

    Cloud architectures constitute cost-efficient moral fibers that will support the transmission, storage, and computing of the applications contents. These infrastructures can be used for scientific and pervasive computing purposes, business. The services delivered through cloud infrastructures increases their exposure to security incidents and attacks. The expenditure and intricacy reduction requirements...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    QoS - Continuous Lane Streaming in Road Network Security Measures in Wireless LAN Communication Network

    Wireless technology has become an important module for communication and for the data transmission. This technology has replaced the present LAN in terms of security and as well as with the data transfer. Wireless Local Area Network (WLAN) effectively satisfies needs within buildings and campus environments. Developing security measures for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Survey of Genetic Based Approach for Multicast Routing in Manet

    An independent, self-governing group of mobile wireless hosts communicate through wireless links by forming a temporary network (Mobile Ad-hoc Network) in a dynamic manner without any fixed and centralized infrastructure. Since the nodes in MANET are not stationary, same path may not be taken always for routing between the sender...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Power Efficient NOC Router Design

    In this paper, the authors present the NOC router architecture with five port support which utilizes dual crossbar arrangement, the latency which arises due to the dual cross bar architecture is reduced by using predominant routing algorithm. This arrangement is more efficient and reduces about 10 % of device utilization...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

    In wireless sensor network, it is an important task to collect the data periodically from various sensors node for monitoring and recording the physical conditions of the environment. The sensed data must be transmitted and received between the nodes in the network. The Low Energy Adaptive Clustering Hierarchy (LEACH) is...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Enhanced Router Design for Network on Chip

    Network on chip is a new paradigm for on chip design that is able to sustain the communication provisions for the SoC with the desired performance. NOC applies networking methodology concepts to system on chip data transfer and it gives noticeable elevation over conventional bus based communication. NOC router is...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in Cloud

    Cloud computing provides the user with the massive pool of resources in terms of pay-as-you-use policy. Cloud delivers these resources on demand through the use of network resources under different load conditions. As the users will be charged based on their usage the effective utilization of resources poses a major...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Comparison of Probabilistic Optimization Algorithms for Resource Scheduling in Cloud Computing Environment

    Cloud Computing has significantly made its landmark in the field of information technology. A concept which initially stood nebulous is now used as a synonym for internet. It has paved a way to increase capacity as well as add capabilities on the fly without investing in new infrastructure, training new...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Analysis of DWT-OFDM and FFT-OFDM Systems

    Performance of Orthogonal Frequency Division Multiplexing (OFDM) systems using Fast Fourier Transforms (FFT) and Discrete Wavelet Transform (DWT) are analyzed in this paper. The performance of DWT-OFDM is assessed by various parameters such as BER, eye diagram and constellation diagram. BER is the ratio of the no. of bits with...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Effect of Four-Wave Mixing on Wdm System and Its Suppression Using Optimum Algorithms

    The phenomenon where an undesirable nonlinear effect gives significantly degraded system performance, and becomes the major drawback for optical communication systems is known as Four wave mixing. In order to achieve affordable BER and Q-factor, a comparison of a WDM system with equal and unequal channel spacing is performed. The...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Analysis of Hash Encrypted DWT-OFDM and Hash Encrypted FFT-OFDM Systems

    Orthogonal Frequency Division Multiplexing (OFDM), in the recent past is being preferably used in wireless communication because of its high data rate and its unique property of the transmitted symbols being mathematically orthogonal. This mathematical orthogonality allows signals with different frequencies to propagate in the same subcarrier unlike traditional Frequency...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Malwares Detection and Prevention Using Set Theory

    Dependence of electronic devices (viz. Computer, Laptop, Mobile, etc.) is increasing exponentially, so large amount of data and information are stored on electronic devices. These electronic devices are interconnected in local, national and international networks, use and share a high number of various software programs. Individuals, corporations, hospitals, communication networks,...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Solution for Network Life Time Problem Using Content Based Energy Efficient Routing Algorithm

    In this paper, the authors consider an overarching problem that encompasses both performance metrics. In particular, they study the network capacity problem under a given network lifetime requirement. Specifically, for a wireless sensor network where each node is provisioned with an initial energy, if all nodes are required to live...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Efficient QoS Mechanism for Multicast Routing With ODMRP in Wireless Adhoc Networks

    The wireless usage has increased rapidly and there is a huge shift in users' expectations. Ad hoc networks can provide better features if there is a proper QoS multicasting strategy developed. The On Demand Multicast Routing Protocol (ODMRP) is a group communication protocol with low control overhead. There are many...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Analysis of Current Computer Network Attack Procedures, Their Mitigation Measures and the Development of an Improved Denial of Service (DOS) Attack Model

    This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS) attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    SMTCI: Secure Multi-Trial Trust Evaluation and Cost-Effective Incentive Mechanism for Multi-Hop Cellular Networks

    In multi-hop cellular networks, finding an optimum and trusted route in the network through intermediate node is a major issue. At MCN, or the next-generation wireless networks, can significantly improve network performance and deployment and help implement many novel applications and services. However, when compared to wired and single-hop wireless...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Simulink Based Spectrum Sensing

    There is an explosion in the field of communication technology today with the advent of numerous services being offered by various vendors. The available spectrum today is very limited and highly congested. Moreover, static allocation and assignment to a particular party leads to inefficient usage as it cannot be put...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Survey on Cloud Storage Systems and Encryption Schemes

    Cloud computing is the collection of networked computers sharing the resources on-demand. The increasing use of cloud computing over the globe has brought into focus a need to design a secure cloud storage system. For safe and satisfactory implementation of the same, there is a need to place emphasis on...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Detailed Survey on Various Tracking Methods Using RFID

    Over the past several years, RFID (Radio Frequency IDentification) has replaced the use of Barcode. RFID technology is used for reducing costs and to improve service levels. It is used in many applications such as health care, military, and department store, medical, business and other related applications. An RFID system...

    Provided By Engg Journals Publications