Engg Journals Publications

Displaying 1-40 of 503 results

  • White Papers // Apr 2014

    Framework for User Authenticity and Access Control Security over a Cloud

    Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Mining Recurrent Pattern Identification on Large Database

    Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining research and it is the first step in the analysis of data rising in a...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    An Ontology Framework For Context-Based Multilingual Document Retrieval

    In this paper the authors aim to present a multilingual ontology model for retrieving documents. This technique is based on context based multilingual translation. Though English is a common language in the world, at times there are situations where there is no chance in rural and remote places. For each...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Methodological Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing offers a variety of dynamic flexible resources to expedite the processing of large scale tasks in pay-by-use manner to public. In that, resource distribution and the effective load balancing among the available resources in heterogeneous environment is a major concern. Load balancing is employed across different data centers...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of data access with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    VLSI Implementation of Low Power High Speed ML MAP Processor Design for Dual Mode Binary Turbo Decoders

    This paper presents the Max Log Maximum a Posteriori (MAX Log MAP) architecture which influences maximum error correcting capacity and minimum hardware complexity. In Turbo decoding the design of Log MAP algorithm is complicated due to the exponential factor in the Log Likelihood Calculation. In this paper, a new architecture...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Kuder-Richardson Coefficient Based Trust Mechanism for Service Discovery in MANETs

    Service discovery in mobile ad-hoc networks is highly crucial due to the lack of centralized infrastructure. Furthermore, varieties of services available through the network may require different levels of security. Thus, a need arises for formulating and deploying an efficient trust oriented service discovery mechanism distributed in each and every...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Conception of a Prototype to Validate a Maintenance Expert System

    Decision making is crucial for the life of many production plants. Good decision need the right information at the right time, and a deep knowledge of the system. This is especially true for older plants that are more prone to failures. Unfortunately, these systems are less rich of monitoring and...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Detection and Discrimination of DDoS Attacks from Flash Crowd Using Entropy Variations

    Internet is a worldwide network that combines millions local to global scope, private public, academics, business, optical network technologies, government networks. It carries an expandable range of information resources and services which lead to bulk exchange of traffic over the Internet every day. This excessive popularity creates some troubles in...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Characterization and Modeling of Uncertainty Intended for a Secured MANET

    Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Cloud Computing: Securing Client Data Storage

    Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with distributed cloud environment, which can be viewed as techniques wherever program developers can share distributed resources with better security. This paper...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    A Novel Biometric System for Person Recognition Using Palm Vein Images

    The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, the authors present a new approach for the personal identification using palm vein images. This paper attempts to...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Mining Weighted Association Rule Using FP - Tree

    The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same significance without assigning their weight within a transaction or record. This paper proposed method gives importance for the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Reducing Communication Overhead for Authentication Using Self Contained Public Key Management Scheme in MANET

    In the past few years, the authors have seen a rapid increase in important application fields of Mobile Ad-hoc NETworks (MANET). Hence, many industrial and academic researchers have been conducted. Because, these applications are closely related to human beings and their physical environment, the usage of MANET on a large...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Minimization of System Resources for Cloud Based Application Using Web Browser Add On

    Evolution of cloud makes users to manage the data and applications online. It is the responsibility of the cloud service providers to care of data secure in terms of transferring and efficient by providing reliable performance. There are many challenges that are faced by the service providers to achieve the...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient and Secure Intrusion Detection Method in Mobile Adhoc Network Using Intuitionistic Fuzzy

    Mobile ad-hoc network is a self organized wireless network which has a dynamic topology where nodes can be joining or leave the network at anytime with large number of nodes. Due to its infrastructure less, dynamic topology and lack of centralization it is vulnerable to many security attacks. In this...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection and Resolution of Deadlocks in Multi-Level Secure Databases

    The increase in the sharing of databases leads to the increase in the concurrency errors, which are termed as deadlocks. Many concurrency control techniques result in deadlocks, because these techniques require the transactions in the system to wait for one another. At this situation, an outside intervention is often required...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Effective Anonymous Imperceptible Secure Re-Active Routing (ISRR) Protocol for MANET

    In wireless networks, to provide the privacy protection is a hard one than wired networks. Many protocols in the network use the encryption and decryption technique to transfer the data in a secure way. In wired network, it doesn't need to consider the mobility of the node. But in wireless...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Proactive Network Security Approach for Multilayered Architecure

    In order to fulfill the organization goals and objectives, multilayered network architecture and various heterogeneous server environments are used. As the network architectures are complex, there is an increased demand in information security. So each organization needs to provide sufficient network security for the known and the unknown attacks according...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Enhancing Accountability for Distributed Data Sharing in the Cloud

    In cloud computing environment resources are shared among various clients and it's important for system provider to allocate the necessary resources for the clients. As the sizes of IT infrastructure continue to grow, cloud computing is a new way of virtualization technologies that enable management of virtual machines over a...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    E-RIHT: Enhanced Hybrid IP Traceback Scheme With 16-Bit Marking Field

    Internet is a worldwide network and used in almost every field of work such as industrial, educational, military etc. Based on the use, its security needs differ. Few applications may need less security and few may need high security. Today various internet attacks are being developed every day, such as...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficeient Encrpytion Algorithm Based on Public Key Cryptography

    In asymmetric key cryptography, also known as Public Key cryptography. There are two different keys which are used that form a key pair. One key is used for encryption and the other is used for decryption, therefore, no other key can decrypt the message. The advantage of this scheme is...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    RFID in Cloud Environment for Attendance Monitoring System

    RFID, primitively used for automatic identification and tracking has now been extensively used for remote storage and retrieval of the data. RFID is similar to barcode but are far more efficient, easy to manufacture, and can be used in environments hostile to barcodes. RFID comprises of a tag; usually sequestered...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient TPD Scheduling Algorithm for Cloud Environment

    Cloud computing is a prominent way to support demand on services. It is a mode of computing where scalable resources are delivered as a service to customers over Internet. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by taking some parameters and restrictions of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Realisation of Resourceful Data Mining Services Using Cloud Computing

    Data security and access control are the most challenging research work going on, at present, in cloud computing. This paper is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Towards a Collaborative Learning Process Based on the Hybrid Cloud Computing and Web 2.0 Tools

    In this paper, the authors propose an online collaborative learning process composed of three iterative steps which mix the advantages of hybrid cloud computing, web 2.0 tools and the online questionnaire to improve the quality of the educational content of the course in the classroom. Indeed, it consists of transporting...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Elastic Calculator : A Mobile Application for Windows Mobile Using Mobile Cloud Services

    Cloud computing is highly significant in this era as it always shows a way to increase the capacity or to add an additional features on the go and also it is worthy to extend these services to mobile devices. It is proposed to design and implement elastic calculator for mobile...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Resource Provisioning Using Batch Mode Heuristic Priority with Round Robin Scheduling

    Million numbers of these users tries to access the data in different type of applications like online shopping etc., which tends to increase the load on a single server. Increase of load on a server results in reduction of throughput and it leads to a strong need of developing and...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Database Synchronization of Mobile-Build by Using Synchronization Framework

    In this paper, the authors propose synchronization of mobile database with server database using Microsoft synchronization framework. It is a platform for data synchronization developed by Microsoft which is used to synchronize multiple data stores. The sync framework lists the each item in a data store which was recognized by...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Mining on Car Database Employing Learning and Clustering Algorithms

    In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the known learning algorithms used are Naive Bayesian (NB) and SMO (Self-Minimal-Optimization). Thus the following two learning algorithms are used on a Car review database and thus...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    CCMP-AES Model with DSR Routing Protocol to Secure Link Layer and Network Layer in Mobile Adhoc Networks

    Mobile ad-hoc network is a special kind of wireless networks. It is a collection of mobile nodes without having aid of established infrastructure. Mobile ad-hoc network are vulnerable to attacks compared to wired networks due to limited physical security, volatile network topologies, power-constrained operations, intrinsic requirement of mutual trust among...

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Protection of Public Network Communication by Using Internet Protocol Security

    In this paper, the authors deal with the issue of the protection of public network communications by using IPSec implementation in Linux kernel. Complete description of custom cipher algorithm Implementation method is given. This paper also contains experiment description with results. In the existing literature there are numerous designs based...

    Provided By Engg Journals Publications

  • White Papers // Oct 2010

    Two Factor Biometric Key for Secure Wireless Networks

    The applications of wireless networks are steadily increasing throughout the world. Wireless transactions are now happening in highly secure banking networks. To have more reliable networks, security of wireless networks is to be strengthened. Various encryption algorithms are employed for this purpose. With standard key size and format, they are...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Infrastructural Map for Information Security

    Threat modeling is an iterative process that encompasses various stages of software development and continues throughout its life cycle. The threat modeling process starts with the phases of identifying critical assets, creating an architecture overview, and decomposing to identify possible points of attack. Data flow diagrams and sequence diagrams are...

    Provided By Engg Journals Publications

  • White Papers // Jul 2010

    Cryptosystem for Information Security

    As computer application were developed to handle financial and personal data, the need for security is necessary. The data on computers is an extremely important aspect for processing and transmitting secure data in various applications. Security is the process of preventing and detecting unauthorized use of computer or network. This...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Enhancing Security of Agent-Oriented Techniques Programs Code Using Jar Files

    Agent-oriented techniques characterize an exciting new way of analyzing, designing and building complex software systems in real time world. These techniques have the prospective to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. The agent oriented programming & software...

    Provided By Engg Journals Publications

  • White Papers // Mar 2010

    SSL-MAP: A More Secure Gossamer-Based Mutual Authentication Protocol for Passive RFID Tags

    RFID systems that employ passive RFID tags, are run using lightweight protocols. The gossamer protocol is a case in point. However, it is found that the gossamer protocol uses rather simple operations, in order to ensure that the protocol is lightweight. This raises security concerns. A protocol based on the...

    Provided By Engg Journals Publications

  • White Papers // Jun 2013

    QR Code Based Secure OTP Distribution Scheme for Authentication in Net-Banking

    Authentication is the process of verifying the identity of a user. One Time Passwords (OTP) plays a vital role for authentication in net-banking to make it more secure. OTP are used to provide higher layer of security over static passwords that are prone to replay attacks. Distribution of OTPs to...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Simulink Based Spectrum Sensing

    There is an explosion in the field of communication technology today with the advent of numerous services being offered by various vendors. The available spectrum today is very limited and highly congested. Moreover, static allocation and assignment to a particular party leads to inefficient usage as it cannot be put...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Survey on Cloud Storage Systems and Encryption Schemes

    Cloud computing is the collection of networked computers sharing the resources on-demand. The increasing use of cloud computing over the globe has brought into focus a need to design a secure cloud storage system. For safe and satisfactory implementation of the same, there is a need to place emphasis on...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Detailed Survey on Various Tracking Methods Using RFID

    Over the past several years, RFID (Radio Frequency IDentification) has replaced the use of Barcode. RFID technology is used for reducing costs and to improve service levels. It is used in many applications such as health care, military, and department store, medical, business and other related applications. An RFID system...

    Provided By Engg Journals Publications

  • White Papers // May 2012

    Wireless Power Transmission for Low Power Micro Device

    Energy consumption is the biggest issue in wireless sensor network and mobile devices. In this proposed model, available radio signals in the region are converted to DC supply and stored in a battery. This power RF harvesting conversion is done by P2110. From the stored energy, controllers which operate at...

    Provided By Engg Journals Publications

  • White Papers // May 2012

    Energy Detection Based Spectrum Sensing for Cognitive Radio

    CR is a persuasive resolution to the spectral congestion crisis by establishing the opportunistic exploitation of unused frequency bands that are not significantly engaged through licensed users. They cannot be utilized by users other than the license CR users at the moment. OFDM is one of the most extensively used...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Survey on Keyword Based Search Over Outsourced Encrypted Data

    Cloud Computing, the trendiest computing in information technology where everything is based on demand service and pay-for-use service. It is bringing of computing services such as SaaS, PaaS and IaaS over the internet that are supervised by arbitrator at outback locations. Many applications such as emails, file storage, business data,...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Estimation of System Operating Margin for Different Modulation Schemes in Vehicular Ad-Hoc Networks

    Vehicular communication is the communication in which the information is directly exchanged among the vehicles. Vehicular Ad-hoc NETwork (VANET) is an off-shoot of Mobile Ad-hoc NETwork (MANET). Ad-Hoc means a system of network elements that combine to form a network requiring little or no planning for communication between vehicle to...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Secure Key Exchange for Cloud Environment Using Cellular Automata With Triple-DES and Error-Detection

    The information housed on the cloud is often seen as valuable to individuals with malicious intent. There is a lot of personal information and potentially secure data that people store on their computers, and this information is now being transferred to the cloud. This makes it critical for the user...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Evaluation of BER for Various Fading Channel in DWT Based MIMO-OFDM System

    MIMO communication is mainly use in the OFDM to improve the communication performance and capacity. DWT based MIMO-OFDM is used in this paper. Compare to the FFT based MIMO-OFDM it has lot advantages. There is no need for cyclic prefix, flexibility and optimal resolution. Ripple (Wavelet) concept has developed as...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Enhanced Routine in OFDM Scheme by Declination of Peak to Average Power Ratio Using Fusion of Hadamard Transform and Companding Transform

    Orthogonal frequency division multiplexing is a multi-carrier inflection method employed in wireless communication. OFDM has attained a remarkable center of attention for its forcefulness with elementary equalization in the existence of rigorous multipath strait circumstances, forceful in opposition to Inter symbol Interference (ISI), multipath fading, and high spectral efficiency. Despite...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Route Challenging Scheme Using Friend Based Rating in MANETs

    Security and Route identification are the major challenges in MANETs. Existing neighbor based routing algorithms provide route based on the quantity of data transferred which may result in congestion. This is because the route having higher amount of transaction is preferred every time. In this paper, the authors propose a...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Efficient Resource Conservation Design in Mobile Ad Hoc Networks Using Reactive Routing Protocol

    Mobile ad hoc network is a compilation of wireless mobile terminals that are in contact with each other in the absence of a permanent infrastructure network. This gives an irregular formation. Many resources like power, energy, reliable data delivery and end to end delay plays a significant role in the...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Survey on the Architectures of Data Security in Cloud Storage Infrastructure

    Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    2CAuth: A New Two Factor Authentication Scheme Using QR-Code

    Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Stationary Wavelet Transform Approach for Improved Fingerprint Recognition Scheme

    Fingerprint recognition, a known biometrics for personal identification is used in securing confidential data contents. Fingerprint exhibits textured like patterns of whorls, loop etc in sector form which is then used for fingerprint matching. The existing method uses Gabor filter which does not provide much Robustness. In this Paper, a...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Vertical Handoff Using the Application of Spanning Tree in 4 G

    Today mobile communication has an important place in every person life in their all business and non-business task. So it will be right to say there is some requirements such type of network. That would be credible or reliable and without the reliable network there can b arise many conflictions...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Enhancing Energy Efficiency of Routing Protocol Through Cross Layer Interactions in MANET

    Energy conservation is important for mobile ad-hoc networks where devices are expected to work for longer periods of time without the need for charging their batteries. High probability of disappointment in ad-hoc networks is due to energy-tired nodes, if some nodes expire early due to lack of energy, they cannot...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Online Malicious Attack Rectification in Wi-Fi Network

    Location estimation is important for many applications in wireless networks. Now-a-days it is being used for military applications and location tracking. RSSI is a measure of signal strength to estimate the distance and to detect intruder by using fingerprinting technique by setting RSSI threshold value. There exists several approaches for...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Hybrid Algorithm for Secure Communication Using Hermitian Matrix

    Currently secure communication is a very challenging task. Cryptography is providing solution to this challenge. But cryptography highly depends on invertible mathematical functions. Mathematical stuff embedded with computer model brings the unbreakable cryptosystem. Many algorithms are proposed in the literature and they are having their own limitations. In this paper,...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Enhanced Concert in Multi-Carrier Wireless System Using Rajan Transform

    Orthogonal frequency division multiplexing is a scheme of encoding digital information on numerous carrier frequencies. The orthogonality permits an proficient modulator and demodulator realization by means of FFT algorithm resting on receiver side, and inverse FFT resting on sender side. A substitute technique for orthogonal transmission and reception of data...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in Cloud

    Cloud computing provides the user with the massive pool of resources in terms of pay-as-you-use policy. Cloud delivers these resources on demand through the use of network resources under different load conditions. As the users will be charged based on their usage the effective utilization of resources poses a major...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Comparison of Probabilistic Optimization Algorithms for Resource Scheduling in Cloud Computing Environment

    Cloud Computing has significantly made its landmark in the field of information technology. A concept which initially stood nebulous is now used as a synonym for internet. It has paved a way to increase capacity as well as add capabilities on the fly without investing in new infrastructure, training new...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Analysis of DWT-OFDM and FFT-OFDM Systems

    Performance of Orthogonal Frequency Division Multiplexing (OFDM) systems using Fast Fourier Transforms (FFT) and Discrete Wavelet Transform (DWT) are analyzed in this paper. The performance of DWT-OFDM is assessed by various parameters such as BER, eye diagram and constellation diagram. BER is the ratio of the no. of bits with...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Effect of Four-Wave Mixing on Wdm System and Its Suppression Using Optimum Algorithms

    The phenomenon where an undesirable nonlinear effect gives significantly degraded system performance, and becomes the major drawback for optical communication systems is known as Four wave mixing. In order to achieve affordable BER and Q-factor, a comparison of a WDM system with equal and unequal channel spacing is performed. The...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Analysis of Hash Encrypted DWT-OFDM and Hash Encrypted FFT-OFDM Systems

    Orthogonal Frequency Division Multiplexing (OFDM), in the recent past is being preferably used in wireless communication because of its high data rate and its unique property of the transmitted symbols being mathematically orthogonal. This mathematical orthogonality allows signals with different frequencies to propagate in the same subcarrier unlike traditional Frequency...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Malwares Detection and Prevention Using Set Theory

    Dependence of electronic devices (viz. Computer, Laptop, Mobile, etc.) is increasing exponentially, so large amount of data and information are stored on electronic devices. These electronic devices are interconnected in local, national and international networks, use and share a high number of various software programs. Individuals, corporations, hospitals, communication networks,...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Solution for Network Life Time Problem Using Content Based Energy Efficient Routing Algorithm

    In this paper, the authors consider an overarching problem that encompasses both performance metrics. In particular, they study the network capacity problem under a given network lifetime requirement. Specifically, for a wireless sensor network where each node is provisioned with an initial energy, if all nodes are required to live...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Efficient QoS Mechanism for Multicast Routing With ODMRP in Wireless Adhoc Networks

    The wireless usage has increased rapidly and there is a huge shift in users' expectations. Ad hoc networks can provide better features if there is a proper QoS multicasting strategy developed. The On Demand Multicast Routing Protocol (ODMRP) is a group communication protocol with low control overhead. There are many...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Analysis of Current Computer Network Attack Procedures, Their Mitigation Measures and the Development of an Improved Denial of Service (DOS) Attack Model

    This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS) attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    SMTCI: Secure Multi-Trial Trust Evaluation and Cost-Effective Incentive Mechanism for Multi-Hop Cellular Networks

    In multi-hop cellular networks, finding an optimum and trusted route in the network through intermediate node is a major issue. At MCN, or the next-generation wireless networks, can significantly improve network performance and deployment and help implement many novel applications and services. However, when compared to wired and single-hop wireless...

    Provided By Engg Journals Publications