Engg Journals Publications

Displaying 1-40 of 503 results

  • White Papers // Apr 2014

    Framework for User Authenticity and Access Control Security over a Cloud

    Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Mining Recurrent Pattern Identification on Large Database

    Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining research and it is the first step in the analysis of data rising in a...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    An Ontology Framework For Context-Based Multilingual Document Retrieval

    In this paper the authors aim to present a multilingual ontology model for retrieving documents. This technique is based on context based multilingual translation. Though English is a common language in the world, at times there are situations where there is no chance in rural and remote places. For each...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Kuder-Richardson Coefficient Based Trust Mechanism for Service Discovery in MANETs

    Service discovery in mobile ad-hoc networks is highly crucial due to the lack of centralized infrastructure. Furthermore, varieties of services available through the network may require different levels of security. Thus, a need arises for formulating and deploying an efficient trust oriented service discovery mechanism distributed in each and every...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Methodological Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing offers a variety of dynamic flexible resources to expedite the processing of large scale tasks in pay-by-use manner to public. In that, resource distribution and the effective load balancing among the available resources in heterogeneous environment is a major concern. Load balancing is employed across different data centers...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of data access with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Conception of a Prototype to Validate a Maintenance Expert System

    Decision making is crucial for the life of many production plants. Good decision need the right information at the right time, and a deep knowledge of the system. This is especially true for older plants that are more prone to failures. Unfortunately, these systems are less rich of monitoring and...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    VLSI Implementation of Low Power High Speed ML MAP Processor Design for Dual Mode Binary Turbo Decoders

    This paper presents the Max Log Maximum a Posteriori (MAX Log MAP) architecture which influences maximum error correcting capacity and minimum hardware complexity. In Turbo decoding the design of Log MAP algorithm is complicated due to the exponential factor in the Log Likelihood Calculation. In this paper, a new architecture...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Detection and Discrimination of DDoS Attacks from Flash Crowd Using Entropy Variations

    Internet is a worldwide network that combines millions local to global scope, private public, academics, business, optical network technologies, government networks. It carries an expandable range of information resources and services which lead to bulk exchange of traffic over the Internet every day. This excessive popularity creates some troubles in...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Characterization and Modeling of Uncertainty Intended for a Secured MANET

    Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Cloud Computing: Securing Client Data Storage

    Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with distributed cloud environment, which can be viewed as techniques wherever program developers can share distributed resources with better security. This paper...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Mining Weighted Association Rule Using FP - Tree

    The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same significance without assigning their weight within a transaction or record. This paper proposed method gives importance for the...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    A Novel Biometric System for Person Recognition Using Palm Vein Images

    The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, the authors present a new approach for the personal identification using palm vein images. This paper attempts to...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Mining on Car Database Employing Learning and Clustering Algorithms

    In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the known learning algorithms used are Naive Bayesian (NB) and SMO (Self-Minimal-Optimization). Thus the following two learning algorithms are used on a Car review database and thus...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection and Avoidance of SQL Injection Attack in Multi-Tier Web Based Application

    In this paper, the authors present SQL injection attack using stored procedure. In SQL injection attack, an attacker might deliver malicious SQL query segments as user input which could effect in a different database request. Using SQL injection attacks, an attacker might thus obtain and modify confidential information. An attacker...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    A Novel Approach for Software Implementation of Graphical Authentication Methodology

    The conventional method of authentication requires the user to remember a text based password which he enters in order to prove his legitimacy. Since security cannot be compromised, such passwords are usually lengthy and complicated else they would be cracked easily with various password hacking techniques. The user thus finds...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Secure Tracking and Transport System Using RWP and GPS

    In the present era where technology has become a part of the people life, every day new applications are developed in every field to serve mankind. Many applications have been developed using GPS (Global Positioning System) such as aquatic and spacecraft routing, surveying and mapping, precise time reference etc. GPS...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection & Classification of Internet Intrusion Based on the Combination of Random Forest and Naive Bayes

    The Use of internet renders a network packets susceptible to attacks ranging from passive eavesdropping to active impersonation, message replay and message distortion. There is no clear description as to what packets can be considered normal or abnormal. If the intrusions are not detected at the appropriate level, the loss...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Wireless Sensor Network - A Survey

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Securing MANET From Blackhole and Wormhole Attacks

    Mobile ad-hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV (Ad-hoc On-demand Distance Vector routing protocol). Black hole...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Knowledge Based Security Using DRM

    To take precautionary secures to the software is combat work. The analysis of avoiding the unauthorized access to the software will be done by the knowledge based security using Digital Rights Management (DRM). DRM is a standard code. The DRM will embed with source code which will protect from piracy....

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Light Weight Secure Framework for Applications of Cloud Environment Using Identity Encryption Method

    Security plays a vital role in cloud computing Services. Public key encryption is the mostly used method to provide security that needs sharing the public keys and digital certificates. Securing the data and resources in the cloud is a difficult task. If the security method adopted in cloud environment is...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Android Mobile Security with Auto boot Application

    In this paper, the authors handle to create the application for android mobile to find a lost mobile. Once installed their application in the mobile, its starts to get the latitude and longitude value of the mobile by using the inbuilt GPS in mobile. The mobile moves from one place...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    A New Business Model for ATM Transaction Security Using Fingerprint Recognition

    Money transactions play a vital role in the nature of trade. Today, ATMs and Credit cards are used for this purpose, the authentication of these transactions are unsecure. To overcome this shortcoming of piracy in money transactions, the author proposes the idea of using fingerprints of customers as password in...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Reducing Communication Overhead for Authentication Using Self Contained Public Key Management Scheme in MANET

    In the past few years, the authors have seen a rapid increase in important application fields of Mobile Ad-hoc NETworks (MANET). Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Minimization of System Resources for Cloud Based Application Using Web Browser Add On

    Evolution of cloud makes users to manage the data and applications online. It is the responsibility of the cloud service providers to care of data secure in terms of transferring and efficient by providing reliable performance. There are many challenges that are faced by the service providers to achieve the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection and Resolution of Deadlocks in Multi-Level Secure Databases

    The increase in the sharing of databases leads to the increase in the concurrency errors, which are termed as deadlocks. Many concurrency control techniques result in deadlocks, because these techniques require the transactions in the system to wait for one another. At this situation, an outside intervention is often required...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Effective Anonymous Imperceptible Secure Re-Active Routing (ISRR) Protocol for MANET

    In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn't need to consider the mobility of the node. But in wireless...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Secure Intrusion Detection Method in Mobile Adhoc Network Using Intuitionistic Fuzzy

    Mobile ad-hoc network is a self organized wireless network which has a dynamic topology where nodes can be joining or leave the network at anytime with large number of nodes. Due to its infrastructure less, dynamic topology and lack of centralization it is vulnerable to many security attacks. In this...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Proactive Network Security Approach for Multilayered Architecure

    In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficient network security for the known and the unknown attacks according...

    Provided By Engg Journals Publications

  • White Papers // Nov 2009

    Generic Web Services: A Step Towards Green Computing

    Software as a Service (SaaS) is a buzzword especially in the realm of Cloud Computing. One can reduce the number of applications deployed on the data-centers by using similar applications hosted by the SaaS providers. Thus, "Reusability" of a SaaS is a key-point of focus promoting the same code-base of...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    E-Commerce Security Using PKI Approach

    As a most popular business model, ECommerce provides a more convenient business mode and lower transaction cost. Currently Ecommerce security is still an obstacle in development of e-commerce. It is the need of the hour to construct a safe and effective transaction environment. Based on the relationship of e-commerce security...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    A Study of Adaptive Replication Technique in Routing Time-Constrained Messages (VoIP) in MANET

    Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Priority Based Uplink Scheduler for IEEE 802.16 Networks

    IEEE 802.16, the standard for fixed, portable and mobile Broadband Wireless Access (BWA) systems, is promising to support different classes of traffic with Quality of Service (QoS). The Medium Access Control (MAC) protocol defines a wide variety of mechanisms for bandwidth allocation and QoS provision. However, the details of how...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    VoIP Over WMN: Effect of Packet Aggregation

    VoIP services are getting more and more popular day by day. In order to meet the users demand for such services irrespective of users location requires wide area wireless coverage .To this extent, wireless mesh networks have been considered as practical and inexpensive solution .In order to improve the performance...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Automatic Detection of Human and Energy Saving Based on Zigbee Communication

    This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize the proposed room architecture, the authors proposed and designed the Zigbee communication. Zigbee is a...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Security Management System for Oilfield Based on GSM Technology

    Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for oil theft, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Parent Siblings Oriented Tree Quorum Protocol

    In this paper, the authors are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical structure of tree on the set of copies of an object. The proposed protocol provides a...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Survey on Optimistic Fair Digital Signature Exchange Protocols

    Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Impact Analysis of Recent DDoS Attacks

    In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Modified Route-Maintenance in AODV Routing Protocol Using Static Nodes in Realistic Mobility Model

    One of the popular wireless network architectures is Mobile Ad Hoc NETwork (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network that consists of nodes which are mobile in nature. Each node in the network acts as a...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Congestion Controlled Multipath Routing Algorithm Based on Path Survivability Factor

    Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Online Health Monitoring System Using Zigbee

    An on-line health monitoring of physiological signals of humans such as temperature and pulse using Zigbee is produced in this paper, by which the temperature and pulse of humans can be monitored from a distant location and some abnormalities can be easily indicated via SMS .The physiological measurements obtained from...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Globally Accessible List (GAL) Based Recovery Concept in Mobile Ad-Hoc Network

    A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Performance Evaluation and Optimization of DSR Routing Algorithm Over 802.11 Based Wireless Mesh Network

    DSR Protocol offers a very effective routing mechanism in Wireless Mesh Networks. But the performance deteriorates when network is subjected to large amount of traffic. In this paper the authors have proposed modifications in DSR protocol, wherein congestion in the network is controlled by reducing the RREQ packet retransmission by...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Development of Coalmine Safety System Using Wireless Sensor Network

    In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for the automatic real-time monitoring of coal mine. The application designs a monitoring system for coal...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Comparative Study of Attacks on AODV-Based Mobile Ad Hoc Networks

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. The security issue is becoming a major concern and bottleneck in the application of MANET....

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Current Research Work on Routing Protocols for MANET: A Literature Survey

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Cloud Based Distributed Databases: The Future Ahead

    Fault tolerant systems are necessary to be there for distributed databases for data centers or distributed databases requires having fault tolerant system due to the higher data scales supported by current data centers. In a large distributed database usually data resides on servers which are dedicated servers having backups. Therefore,...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Survey of Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks

    In this survey paper, the authors discussed a lot of conventional protocols and their modification which includes energy efficiency with the importance of energy efficient routing protocols. They conclude that there is not a single protocol which can give the best performance in ad-hoc network. They have also discussed the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2010

    Minimizing End to End Delay by Power Aware Routing in Wireless Mobile Adhoc Network

    In this paper, the authors proposed an algorithm for joint power control and routing, along with cross layer interactions in wireless ad-hoc networks. The performance analysis expects that there will be a better improvement in end to end delay with this algorithm compared to existing DSR algorithm. To use congestion...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    QoS Parameter Analysis on AODV and DSDV Protocols in a Wireless Network

    Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV) routing protocol in mobile ad hoc...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    BER Analysis of Coded and Uncoded MIMO-OFDM System in Wireless Communication

    Alamouti's space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Novel Routing Attack in Mobile Ad Hoc Networks

    Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to Denial Of Service (DOS) attacks...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Cluster-ID Routing Scheme in Wireless Sensor Networks

    One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor network for nodes and network life. There are several existing routing protocols to solve this problem. LEACH (Low-Energy...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Analyzing Throughput of TCP in IEEE 802.11 Based Ad-Hoc Networks

    In order to allow programmers to follow conventional techniques while creating applications that uses an internet, software in the internet must provide the same semantics as a conventional computer system, it means it must guarantee reliable communication. Transport protocol provides reliability, which is fundamental for all the applications. The Transmission...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Refined Anchor Free Localisation for Wireless Sensor Monitoring in Wireless Sensor Networks

    Localisation is required for many ad-hoc sensor network applications. In this paper, the authors look at the limitations of the existing localisation technique, Anchor Free Localisation (AFL) with regards to coping with non-uniform anchor distributions and errors in ranging information. They present a refined approach called Refined Anchor Free Localisation...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    Comparison and Analysis of RREQ and RREP for Dynamic Wireless Network

    This paper compares and analyzes RREQ and RREP for wireless networks using Zigbee technology for transferring data between dynamically moving nodes. The system is simulated on Ptolemy 2 Visual Sense simulating tool, using power loss channel for 2, 4, 6, 8 number of composites nodes, with three different scenarios of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    An Improved Snoop for TCP Reno and TCP Sack in Wired-Cum-Wireless Networks

    TCP is the most widely used transport protocol originally designed for wired networks. But many experiments have shown that its performance is poor when used in wireless networks. Also improving its performance in wired-cum-wireless networks preserving the end-to-end nature of TCP is a difficult task. To address this issue, several...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Performance Analysis of Lifetime Maximizing Trees for Data Aggregation in Wireless Sensor Networks

    In this paper the performance of the proposed DLMT and CLMT algorithms are compared. These proposed algorithms tend to extend the node lifetime. Decentralized Lifetime Maximizing Tree (DLMT) features in nodes with higher energy to be chosen as data aggregating parents while Centralized Lifetime Maximizing Tree (CLMT) features with the...

    Provided By Engg Journals Publications

  • White Papers // Feb 2012

    Developing a Mobile Adaptive Test (MAT) in an M-Learning Environment for Android Based 3G Mobile Devices

    M-Learning (e-Learning through mobile device) is gaining its importance worldwide among the Learning Community owing to the ubiquitous and powerful computing nature of the Mobile Devices. In an M-Learning environment, Student Assessment and Evaluation of their knowledge acquisition is a vital factor. Adaptive Testing helps the instructor to obtain an...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Web Based 'C' IDE: Approach

    A Web based environment has been designed to execute C programs without explicitly installing any compilers on the machine, thus addressing the concerns of portability and accessibility. The environment runs on a Linux server, uses password authentication and provides each user with separate project directories to store all his programs....

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Tracing Real Time Location of a Friend in Mobile System

    The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, and mobile robots that work among people. The robustness of the system will be able...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    MSMET: A Modified & Secure Multilanguage Encryption Technique

    Cryptography plays an integral role in secure communication and is usually the strongest link in the chain of security. Multilanguage cryptography, an advancement of classical cryptography, may evolve as a choice of classical cryptography lovers seeking a better security. The authors proposed an algorithm in Multilanguage approach, which generates different...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Integrated Model for Software Usability

    In recent years, the usability of software systems has been recognized as an important quality factor. Many definitions and models of usability have been given so far but they are brief and informal. Most of these models also fail to cover all of the aspects of usability and are not...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    A Framework for Extracting Information From Web Using VTD-XML's Xpath

    The exponential growth of WWW (World Wide Web) is the cause for vast pool of information as well as several challenges posed by it, such as extracting potentially useful and unknown information from WWW. Many websites are built with HTML, because of its unstructured layout, it is difficult to obtain...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes communicating with each other using multi-hop wireless. One of the main challenges of MANET is the design of robust routing algorithms that adapt to the frequent and randomly changing network topology. A variety of routing protocols have...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    Optimization of Rectangular Microstrip Antenna Using Radial Basis Function Neural Network

    The mobile communication systems usually require a portable wireless antenna size in order to meet as requirement of mobile units. Microstrip patch antenna is one of the best suitable antennas for mobile communication due to its attractive features of low profile, light weight and easy fabrication. In general, it has...

    Provided By Engg Journals Publications

  • White Papers // Mar 2012

    A Parallel Access Method for Spatial Data Using GPU

    Spatial Access Methods (SAMs) are used for information retrieval in large spatial databases. Many of the SAMs use sequential tree structures to search the result set of the spatial data which are contained in the given query region. In order to improve performance for the SAM, this paper proposes a...

    Provided By Engg Journals Publications