Engg Journals Publications

Displaying 1-40 of 621 results

  • White Papers // Jun 2010

    Minimizing End to End Delay by Power Aware Routing in Wireless Mobile Adhoc Network

    In this paper, the authors proposed an algorithm for joint power control and routing, along with cross layer interactions in wireless ad-hoc networks. The performance analysis expects that there will be a better improvement in end to end delay with this algorithm compared to existing DSR algorithm. To use congestion...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    QoS Parameter Analysis on AODV and DSDV Protocols in a Wireless Network

    Wireless networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. To improve the packet delivery ratio of Destination-Sequenced Distance Vector (DSDV) routing protocol in mobile ad hoc...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    BER Analysis of Coded and Uncoded MIMO-OFDM System in Wireless Communication

    Alamouti's space-time coding scheme for Multi-Input Multi-Output (MIMO) system has drawn much attention in 4G wireless technologies. Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be combined with antenna arrays at the transmitter and receiver to increase the diversity gain and...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Novel Routing Attack in Mobile Ad Hoc Networks

    Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to Denial Of Service (DOS) attacks...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Cluster-ID Routing Scheme in Wireless Sensor Networks

    One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor network for nodes and network life. There are several existing routing protocols to solve this problem. LEACH (Low-Energy...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Analyzing Throughput of TCP in IEEE 802.11 Based Ad-Hoc Networks

    In order to allow programmers to follow conventional techniques while creating applications that uses an internet, software in the internet must provide the same semantics as a conventional computer system, it means it must guarantee reliable communication. Transport protocol provides reliability, which is fundamental for all the applications. The Transmission...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Refined Anchor Free Localisation for Wireless Sensor Monitoring in Wireless Sensor Networks

    Localisation is required for many ad-hoc sensor network applications. In this paper, the authors look at the limitations of the existing localisation technique, Anchor Free Localisation (AFL) with regards to coping with non-uniform anchor distributions and errors in ranging information. They present a refined approach called Refined Anchor Free Localisation...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    Comparison and Analysis of RREQ and RREP for Dynamic Wireless Network

    This paper compares and analyzes RREQ and RREP for wireless networks using Zigbee technology for transferring data between dynamically moving nodes. The system is simulated on Ptolemy 2 Visual Sense simulating tool, using power loss channel for 2, 4, 6, 8 number of composites nodes, with three different scenarios of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2011

    An Improved Snoop for TCP Reno and TCP Sack in Wired-Cum-Wireless Networks

    TCP is the most widely used transport protocol originally designed for wired networks. But many experiments have shown that its performance is poor when used in wireless networks. Also improving its performance in wired-cum-wireless networks preserving the end-to-end nature of TCP is a difficult task. To address this issue, several...

    Provided By Engg Journals Publications

  • White Papers // Aug 2010

    E-Commerce Security Using PKI Approach

    As a most popular business model, ECommerce provides a more convenient business mode and lower transaction cost. Currently Ecommerce security is still an obstacle in development of e-commerce. It is the need of the hour to construct a safe and effective transaction environment. Based on the relationship of e-commerce security...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Cloud Based Distributed Databases: The Future Ahead

    Fault tolerant systems are necessary to be there for distributed databases for data centers or distributed databases requires having fault tolerant system due to the higher data scales supported by current data centers. In a large distributed database usually data resides on servers which are dedicated servers having backups. Therefore,...

    Provided By Engg Journals Publications

  • White Papers // Dec 2010

    A Survey of Energy Efficient Routing Protocols for Mobile Ad-Hoc Networks

    In this survey paper, the authors discussed a lot of conventional protocols and their modification which includes energy efficiency with the importance of energy efficient routing protocols. They conclude that there is not a single protocol which can give the best performance in ad-hoc network. They have also discussed the...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Performance Evaluation and Optimization of DSR Routing Algorithm Over 802.11 Based Wireless Mesh Network

    DSR Protocol offers a very effective routing mechanism in Wireless Mesh Networks. But the performance deteriorates when network is subjected to large amount of traffic. In this paper the authors have proposed modifications in DSR protocol, wherein congestion in the network is controlled by reducing the RREQ packet retransmission by...

    Provided By Engg Journals Publications

  • White Papers // May 2011

    Development of Coalmine Safety System Using Wireless Sensor Network

    In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for the automatic real-time monitoring of coal mine. The application designs a monitoring system for coal...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Inferring Packet Forwarding Priority, Network Tomography, Congestion Control Based on Packet Probing in Network

    Current Internet is a massive, distributed network which continues to grow in size as globalization takes major role in everyone's life like e-commerce, social networking and related activities grow. The heterogeneous and largely unregulated structure of the Internet renders tasks such as optimized service provision, rate limiting certain classes of...

    Provided By Engg Journals Publications

  • White Papers // Jan 2011

    Comparative Study of Attacks on AODV-Based Mobile Ad Hoc Networks

    In recent years, the use of Mobile Ad hoc NETworks (MANETs) has been widespread in many applications, The lack of infrastructures in MANETs makes the detection and control of security hazards all the more difficult. The security issue is becoming a major concern and bottleneck in the application of MANET....

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    A Study of Adaptive Replication Technique in Routing Time-Constrained Messages (VoIP) in MANET

    Imposing the constraint of timely delivery on usual messages is referred as time-constrained messages. The utility of such messages depends upon the time at which they arrive at their destination. Due to contention among randomly arriving messages at each node/link and multi-hops between the source and destination that a message...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Priority Based Uplink Scheduler for IEEE 802.16 Networks

    IEEE 802.16, the standard for fixed, portable and mobile Broadband Wireless Access (BWA) systems, is promising to support different classes of traffic with Quality of Service (QoS). The Medium Access Control (MAC) protocol defines a wide variety of mechanisms for bandwidth allocation and QoS provision. However, the details of how...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    VoIP Over WMN: Effect of Packet Aggregation

    VoIP services are getting more and more popular day by day. In order to meet the users demand for such services irrespective of users location requires wide area wireless coverage .To this extent, wireless mesh networks have been considered as practical and inexpensive solution .In order to improve the performance...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Automatic Detection of Human and Energy Saving Based on Zigbee Communication

    This paper proposes automatic detection of human and Energy saving room architecture to reduce standby power consumption and to make the room easily controllable with an IR remote control of a home appliance. To realize the proposed room architecture, the authors proposed and designed the Zigbee communication. Zigbee is a...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Security Management System for Oilfield Based on GSM Technology

    Security Management at the industries mainly during the night times at the oil field is a critical task for the security people. Checking for oil theft, power failure, temperature range checking, tilt checking of the tanks, leakage of oil by rotating the pump done by the thieves is a critical...

    Provided By Engg Journals Publications

  • White Papers // Jun 2011

    Parent Siblings Oriented Tree Quorum Protocol

    In this paper, the authors are proposing a new replica control algorithm Parent Siblings Oriented Tree Quorum Protocol (PSTQ) for the management of replicated data in distributed database system. This algorithm imposes a logical structure of tree on the set of copies of an object. The proposed protocol provides a...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    A Survey on Optimistic Fair Digital Signature Exchange Protocols

    Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For these applications fair exchange must be assured. A fair protocol allows two parties to exchange digital signatures over the Internet...

    Provided By Engg Journals Publications

  • White Papers // Feb 2011

    Impact Analysis of Recent DDoS Attacks

    In the present era Internet has changed the way of traditional essential services such as banking, transportation, power, health, and defence being operated. These operations are being replaced by cheaper, more efficient Internet-based applications. It is all because of rapid growth and success of Internet in every sector. Unfortunately with...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Modified Route-Maintenance in AODV Routing Protocol Using Static Nodes in Realistic Mobility Model

    One of the popular wireless network architectures is Mobile Ad Hoc NETwork (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network that consists of nodes which are mobile in nature. Each node in the network acts as a...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Congestion Controlled Multipath Routing Algorithm Based on Path Survivability Factor

    Mobile wireless ad hoc network has emerged as the self organized wireless interconnection for the various applications in random topology. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology caused by node mobility. Congested links are also an expected characteristic of such...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    Online Health Monitoring System Using Zigbee

    An on-line health monitoring of physiological signals of humans such as temperature and pulse using Zigbee is produced in this paper, by which the temperature and pulse of humans can be monitored from a distant location and some abnormalities can be easily indicated via SMS .The physiological measurements obtained from...

    Provided By Engg Journals Publications

  • White Papers // Apr 2011

    A Globally Accessible List (GAL) Based Recovery Concept in Mobile Ad-Hoc Network

    A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation whose primary role is to provide a reliable end to end communication between nodes in the network. However achieving reliable transmission in mobile wireless network is crucial due to change in the network topology...

    Provided By Engg Journals Publications

  • White Papers // May 2010

    Current Research Work on Routing Protocols for MANET: A Literature Survey

    Mobile Ad hoc NETworks (MANETs) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence,...

    Provided By Engg Journals Publications

  • White Papers // Dec 2012

    Study of Data Mining Approach for Mobile Computing Environment

    Efficient data mining techniques are required to discover useful information and knowledge. This is due to the effective involvement of computers and the improvement in Database Technology which has provided large data. The mobile data allocation scheme is proposed such that the data are replicated statically for traditional Databases' for...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    Survey on Security, Storage, and Networking of Cloud Computing

    Cloud architectures constitute cost-efficient moral fibers that will support the transmission, storage, and computing of the applications contents. These infrastructures can be used for scientific and pervasive computing purposes, business. The services delivered through cloud infrastructures increases their exposure to security incidents and attacks. The expenditure and intricacy reduction requirements...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    QoS - Continuous Lane Streaming in Road Network Security Measures in Wireless LAN Communication Network

    Wireless technology has become an important module for communication and for the data transmission. This technology has replaced the present LAN in terms of security and as well as with the data transfer. Wireless Local Area Network (WLAN) effectively satisfies needs within buildings and campus environments. Developing security measures for...

    Provided By Engg Journals Publications

  • White Papers // Jun 2010

    Analysis of AOMDV and OLSR Routing Protocols Under Levy-Walk Mobility Model and Gauss-Markov Mobility Model for Ad Hoc Networks

    In this paper, the authors have compared AOMDV and OLSR routing protocol using Levy-Walk Mobility Model and Gauss-Markov Mobility Model. OLSR is a proactive, table-driven, link state routing protocol while AOMDV is a reactive routing protocol. Besides eyeing the details of comparing a proactive routing protocol with reactive routing protocol...

    Provided By Engg Journals Publications

  • White Papers // Sep 2012

    An Enhanced Active Contour Based Segmentation for Fingerprint Extraction

    Fingerprint Segmentation is one of the critical and important steps in Automatic Fingerprint Recognition System (AFIS). It is a process that separates the fingerprint image into two regions, the foreground and background. The foreground region will have the fingerprint region containing features for recognition and the background region is the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2012

    A Research Paper: An ASCII Value Based Data Encryption Algorithm and Its Comparison With Other Symmetric Data Encryption Algorithms

    Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transforming ciphertext into the plaintext where ciphertext is the input to the decryption process and plaintext is...

    Provided By Engg Journals Publications

  • White Papers // Sep 2012

    Efficient VM Load Balancing Algorithm for a Cloud Computing Environment

    Cloud computing is a fast growing area in computing research and industry today. With the advancement of the Cloud, there are new possibilities opening up on how applications can be built and how different services can be offered to the end user through Virtualization, on the internet. There are the...

    Provided By Engg Journals Publications

  • White Papers // Sep 2012

    A Modified Robust Queue Management With Feedback Compensation Technique to Manage the Congestion Control in Wireless Communication Networks

    At present there has been a tremendous growth in the computer networks and wireless networks. Due to the enormous growth of voice, audio, video and data applications over the wireless networks, the requirement of congestion control mechanism is also developing along with the development of wireless network applications. The congestion...

    Provided By Engg Journals Publications

  • White Papers // Aug 2012

    Effect of Obstacles in the Formation of FoV Based Clusters in Wireless Multimedia Sensor Network

    Wireless multimedia sensor network (WMSN) uses multimedia nodes to sense the area that are uncorrelated to the areas sensed by the neighboring sensors. Because of the extensive amount of data produced in wireless multimedia sensor network, clustering schemes eligible in wireless sensor network are not suitable for WMSN. For this...

    Provided By Engg Journals Publications

  • White Papers // Aug 2012

    Effect of Modulation Schemes on Performance of OFDM Based Wireless Network Using Smart Antenna

    This paper, the authors have presented the effect of different modulation Techniques (QPSK, 16QAM and 64QAM) and number of antenna elements at the receiver (Smart Antenna) on the performance of beamforming in OFDM based Wireless network. The performance of the proposed technique is tested for adaptive beam forming algorithm, Least...

    Provided By Engg Journals Publications

  • White Papers // Aug 2012

    WWDC Server Software Inventory Management and Automation

    Many organizations maintain a large Data Centre for its business operation. In that different administration team works on large set of servers and performs several tasks on need basis. It's too complicate to handle this large number of server manually in terms of maintaining its configuration, scheduled operation, administrative tasks...

    Provided By Engg Journals Publications