Engg Journals Publications

Displaying 1-40 of 593 results

  • White Papers // Nov 2009

    Generic Web Services: A Step Towards Green Computing

    Software as a Service (SaaS) is a buzzword especially in the realm of Cloud Computing. One can reduce the number of applications deployed on the data-centers by using similar applications hosted by the SaaS providers. Thus, "Reusability" of a SaaS is a key-point of focus promoting the same code-base of...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    E-Commerce Security Using PKI Approach

    As a most popular business model, ECommerce provides a more convenient business mode and lower transaction cost. Currently Ecommerce security is still an obstacle in development of e-commerce. It is the need of the hour to construct a safe and effective transaction environment. Based on the relationship of e-commerce security...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    A Study of Adaptive Replication Technique in Routing Time-Constrained Messages (VoIP) in MANET

    Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Priority Based Uplink Scheduler for IEEE 802.16 Networks

    IEEE 802.16, the standard for fixed, portable and mobile Broadband Wireless Access (BWA) systems, is promising to support different classes of traffic with Quality of Service (QoS). The Medium Access Control (MAC) protocol defines a wide variety of mechanisms for bandwidth allocation and QoS provision. However, the details of how...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    VoIP Over WMN: Effect of Packet Aggregation

    VoIP services are getting more and more popular day by day. In order to meet the users demand for such services irrespective of users location requires wide area wireless coverage .To this extent, wireless mesh networks have been considered as practical and inexpensive solution .In order to improve the performance...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Automatic Detection of Human and Energy Saving Based on Zigbee Communication

    This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize the proposed room architecture, the authors proposed and designed the Zigbee communication. Zigbee is a...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Security Management System for Oilfield Based on GSM Technology

    Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for oil theft, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Parent Siblings Oriented Tree Quorum Protocol

    In this paper, the authors are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical structure of tree on the set of copies of an object. The proposed protocol provides a...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Survey on Optimistic Fair Digital Signature Exchange Protocols

    Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Impact Analysis of Recent DDoS Attacks

    In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Modified Route-Maintenance in AODV Routing Protocol Using Static Nodes in Realistic Mobility Model

    One of the popular wireless network architectures is Mobile Ad Hoc NETwork (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network that consists of nodes which are mobile in nature. Each node in the network acts as a...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Congestion Controlled Multipath Routing Algorithm Based on Path Survivability Factor

    Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Online Health Monitoring System Using Zigbee

    An on-line health monitoring of physiological signals of humans such as temperature and pulse using Zigbee is produced in this paper, by which the temperature and pulse of humans can be monitored from a distant location and some abnormalities can be easily indicated via SMS .The physiological measurements obtained from...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Globally Accessible List (GAL) Based Recovery Concept in Mobile Ad-Hoc Network

    A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Performance Evaluation and Optimization of DSR Routing Algorithm Over 802.11 Based Wireless Mesh Network

    DSR Protocol offers a very effective routing mechanism in Wireless Mesh Networks. But the performance deteriorates when network is subjected to large amount of traffic. In this paper the authors have proposed modifications in DSR protocol, wherein congestion in the network is controlled by reducing the RREQ packet retransmission by...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Development of Coalmine Safety System Using Wireless Sensor Network

    In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for the automatic real-time monitoring of coal mine. The application designs a monitoring system for coal...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Comparative Study of Attacks on AODV-Based Mobile Ad Hoc Networks

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. The security issue is becoming a major concern and bottleneck in the application of MANET....

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Current Research Work on Routing Protocols for MANET: A Literature Survey

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Cloud Based Distributed Databases: The Future Ahead

    Fault tolerant systems are necessary to be there for distributed databases for data centers or distributed databases requires having fault tolerant system due to the higher data scales supported by current data centers. In a large distributed database usually data resides on servers which are dedicated servers having backups. Therefore,...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Survey of Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks

    In this survey paper, the authors discussed a lot of conventional protocols and their modification which includes energy efficiency with the importance of energy efficient routing protocols. They conclude that there is not a single protocol which can give the best performance in ad-hoc network. They have also discussed the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2010

    Minimizing End to End Delay by Power Aware Routing in Wireless Mobile Adhoc Network

    In this paper, the authors proposed an algorithm for joint power control and routing, along with cross layer interactions in wireless ad-hoc networks. The performance analysis expects that there will be a better improvement in end to end delay with this algorithm compared to existing DSR algorithm. To use congestion...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    QoS Parameter Analysis on AODV and DSDV Protocols in a Wireless Network

    Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV) routing protocol in mobile ad hoc...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    BER Analysis of Coded and Uncoded MIMO-OFDM System in Wireless Communication

    Alamouti's space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Novel Routing Attack in Mobile Ad Hoc Networks

    Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to Denial Of Service (DOS) attacks...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Cluster-ID Routing Scheme in Wireless Sensor Networks

    One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor network for nodes and network life. There are several existing routing protocols to solve this problem. LEACH (Low-Energy...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Analyzing Throughput of TCP in IEEE 802.11 Based Ad-Hoc Networks

    In order to allow programmers to follow conventional techniques while creating applications that uses an internet, software in the internet must provide the same semantics as a conventional computer system, it means it must guarantee reliable communication. Transport protocol provides reliability, which is fundamental for all the applications. The Transmission...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Refined Anchor Free Localisation for Wireless Sensor Monitoring in Wireless Sensor Networks

    Localisation is required for many ad-hoc sensor network applications. In this paper, the authors look at the limitations of the existing localisation technique, Anchor Free Localisation (AFL) with regards to coping with non-uniform anchor distributions and errors in ranging information. They present a refined approach called Refined Anchor Free Localisation...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    Comparison and Analysis of RREQ and RREP for Dynamic Wireless Network

    This paper compares and analyzes RREQ and RREP for wireless networks using Zigbee technology for transferring data between dynamically moving nodes. The system is simulated on Ptolemy 2 Visual Sense simulating tool, using power loss channel for 2, 4, 6, 8 number of composites nodes, with three different scenarios of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    An Improved Snoop for TCP Reno and TCP Sack in Wired-Cum-Wireless Networks

    TCP is the most widely used transport protocol originally designed for wired networks. But many experiments have shown that its performance is poor when used in wireless networks. Also improving its performance in wired-cum-wireless networks preserving the end-to-end nature of TCP is a difficult task. To address this issue, several...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks

    In this paper the performance of the proposed DLMT and CLMT algorithms are compared. These proposed algorithms tend to extend the node lifetime. Decentralized Lifetime Maximizing Tree (DLMT) features in nodes with higher energy to be chosen as data aggregating parents while Centralized Lifetime Maximizing Tree (CLMT) features with the...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    Developing a Mobile Adaptive Test (MAT) in an M-Learning Environment for Android Based 3G Mobile Devices

    M-Learning (e-Learning through mobile device) is gaining its importance worldwide among the Learning Community owing to the ubiquitous and powerful computing nature of the Mobile Devices. In an M-Learning environment, Student Assessment and Evaluation of their knowledge acquisition is a vital factor. Adaptive Testing helps the instructor to obtain an...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Web Based 'C' IDE: Approach

    A Web based environment has been designed to execute C programs without explicitly installing any compilers on the machine, thus addressing the concerns of portability and accessibility. The environment runs on a Linux server, uses password authentication and provides each user with separate project directories to store all his programs....

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Tracing Real Time Location of a Friend in Mobile System

    The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, and mobile robots that work among people. The robustness of the system will be able...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    MSMET: A Modified & Secure Multilanguage Encryption Technique

    Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Multilanguage cryptography, an advancement of classical cryptography, may evolve as a choice of classical cryptography lovers seeking a better security. The authors proposed an algorithm in Multilanguage approach, which generates different...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Integrated Model for Software Usability

    In recent years, the usability of software systems has been recognized as an important quality factor. Many definitions and models of usability have been given so far but they are brief and informal. Most of these models also fail to cover all of the aspects of usability and are not...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    A Framework for Extracting Information From Web Using VTD-XML's Xpath

    The exponential growth of WWW (World Wide Web) is the cause for vast pool of information as well as several challenges posed by it, such as extracting potentially useful and unknown information from WWW. Many websites are built with HTML, because of its unstructured layout, it is difficult to obtain...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes communicating with each other using multi-hop wireless. One of the main challenges of MANET is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. A variety of routing protocols have...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Optimization of Rectangular Microstrip Antenna Using Radial Basis Function Neural Network

    The mobile communication systems usually require a portable wireless antenna size in order to meet as requirement of mobile units. Microstrip patch antenna is one of the best suitable antennas for mobile communication due to its attractive features of low profile, light weight and easy fabrication. In general, it has...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    A Parallel Access Method for Spatial Data Using GPU

    Spatial Access Methods (SAMs) are used for information retrieval in large spatial databases. Many of the SAMs use sequential tree structures to search the result set of the spatial data which are contained in the given query region. In order to improve performance for the SAM, this paper proposes a...

    Provided By Engg Journals Publications