Engg Journals Publications

Displaying 1-40 of 503 results

  • White Papers // Apr 2014

    Framework for User Authenticity and Access Control Security over a Cloud

    Cloud computing has emerged as a computing paradigm bringing forward many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same trusted domain as data owners. Considering the user access control part, in recent years many...

    Provided By Engg Journals Publications

  • White Papers // Apr 2014

    Mining Recurrent Pattern Identification on Large Database

    Recurrent pattern mining is an important problem in the context of data mining. In this paper data mining algorithms have been discussed and compared. Recurrent pattern mining has been an important area in data mining research and it is the first step in the analysis of data rising in a...

    Provided By Engg Journals Publications

  • White Papers // Mar 2014

    An Ontology Framework For Context-Based Multilingual Document Retrieval

    In this paper the authors aim to present a multilingual ontology model for retrieving documents. This technique is based on context based multilingual translation. Though English is a common language in the world, at times there are situations where there is no chance in rural and remote places. For each...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Efficient Mining of Weighted Quantitative Association Rules and Characterization of Frequent Itemsets

    In recent years, a number of association rule mining algorithms were developed. In these algorithms, two important measures viz., support count and confidence were used to generate the frequent itemsets and the corresponding association rules in a market basket database. But in reality, these two measures are not sufficient for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2014

    Approaches for Managing and Analyzing Unstructured Data

    Large volumes of data that will be stored and accessed in future are unstructured. The unstructured data is generated in a very fast pace and uses large storage areas. This increases the storage budget. Extracting value from this unstructured data which balances the budget is the most challenging task. Archives...

    Provided By Engg Journals Publications

  • White Papers // Dec 2013

    Cost Effective Cloud Environment Setup to Secure Corporate Data

    In recent years ad-hoc parallel processing has emerged to be one among the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major cloud computing firms have began to integrate frameworks for parallel processing in their product portfolio, creating it simple for purchasers to access these services and to deploy their programs. However,...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Kuder-Richardson Coefficient Based Trust Mechanism for Service Discovery in MANETs

    Service discovery in mobile ad-hoc networks is highly crucial due to the lack of centralized infrastructure. Furthermore, varieties of services available through the network may require different levels of security. Thus, a need arises for formulating and deploying an efficient trust oriented service discovery mechanism distributed in each and every...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Cloud Based Gateway Clustering of Cloud Data Retrieval with GCD Recovery Scheme

    Different parallelization approaches are available to cluster the computers and to scale the data and resources. With them, parallel clustering mechanism is used to faster the computation time of data access with minimal cost. But, this mechanism is not feasible for efficient data retrieve over cloud environment and is not...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Methodological Survey on Load Balancing Techniques in Cloud Computing

    Cloud computing offers a variety of dynamic flexible resources to expedite the processing of large scale tasks in pay-by-use manner to public. In that, resource distribution and the effective load balancing among the available resources in heterogeneous environment is a major concern. Load balancing is employed across different data centers...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Node Attribute Behavior Based Intrusion Detection in Sensor Networks

    Security is one of the important problem in wireless sensor networks. With limited energy resources and processing resources, this paper focus on node attribute behavior based anomaly detection system and deals only with attributes of layered sensor node. It introduces node attribute behavioral index. The detection uses genetic algorithm which...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Secure User Authentication Using Sclera in Quick Response Codes

    In this paper, an authentication method using sclera embedded in Quick Response (QR) codes is proposed. Quick response codes are two dimensional barcodes which can hold more data and can be fastly readable by personal computers and handheld devices like mobile phones, smart phones and tablet PCs. Biometrics though noted...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    EETSS: Energy Efficient Transitive Signature Scheme for Secure Group Communication in MANETs

    A secure group communication in mobile ad-hoc networks is challenging due to the mobility and limitations in computational and battery power of the nodes. This paper can be achieved by multicast routing protocol that ensures security through key management schemes. In this paper, the authors proposed an energy efficient multicast...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    An Analysis of Broadcast Authentication and Security Schemes in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are susceptible to various attacks as they are placed in hostile environments. Several security and authentication mechanisms are proposed for in terms of key exchange mechanisms, handshake protocols, and other routing protocols. The proposed triple key based broadcast authentication protocol is compared with the several other...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    A Secure and Decentralized Registration Scheme for IPv6 Network-Based Mobility

    For frequent movement of a mobile device, there is a need for a secure registration procedure of the mobile device by announcing its current location to the home network, especially, if it is not in the home domain. While devising the registration procedure for Mobile IPv6 (MIPv6) based network, it...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    VLSI Implementation of Low Power High Speed ML MAP Processor Design for Dual Mode Binary Turbo Decoders

    This paper presents the Max Log Maximum a Posteriori (MAX Log MAP) architecture which influences maximum error correcting capacity and minimum hardware complexity. In Turbo decoding the design of Log MAP algorithm is complicated due to the exponential factor in the Log Likelihood Calculation. In this paper, a new architecture...

    Provided By Engg Journals Publications

  • White Papers // Nov 2013

    Conception of a Prototype to Validate a Maintenance Expert System

    Decision making is crucial for the life of many production plants. Good decision need the right information at the right time, and a deep knowledge of the system. This is especially true for older plants that are more prone to failures. Unfortunately, these systems are less rich of monitoring and...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Detection and Discrimination of DDoS Attacks from Flash Crowd Using Entropy Variations

    Internet is a worldwide network that combines millions local to global scope, private public, academics, business, optical network technologies, government networks. It carries an expandable range of information resources and services which lead to bulk exchange of traffic over the Internet every day. This excessive popularity creates some troubles in...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    Characterization and Modeling of Uncertainty Intended for a Secured MANET

    Mobile ad-hoc network is a chaos for decades due to its dynamic and heuristic base. It employs several forms of uncertainty such as vagueness and imprecision. Vagueness can be taken in terms of linguistic assumptions such as grading and classification for the acceptance. Imprecision on the other hand can be...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    User Interest Level Based Preprocessing Algorithms Using Web Usage Mining

    Web logs take an important role to know about user behavior. Several pattern mining techniques were developed to understand the user behavior. A specific kind of preprocessing technique improves the quality and accuracy of the pattern mining algorithms. The existing algorithms have done the preprocessing activities for reducing the size...

    Provided By Engg Journals Publications

  • White Papers // Sep 2013

    An Efficient and Accurate Intrusion Detection System to Detect the Network Attack Groups Using the Layer Wise Individual Feature Set

    In the field of network security, intrusion is the severe threat for various networks. So an efficient Intrusion Detection System (IDS) is required to detect the intrusions that are spread through the Network. This paper is to reduce the average control path latency incurred between request and response of the...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    A Novel Biometric System for Person Recognition Using Palm Vein Images

    The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, the authors present a new approach for the personal identification using palm vein images. This paper attempts to...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Mining Weighted Association Rule Using FP - Tree

    The main goal of association rule mining is to examine large transaction databases which reveal implicit relationship among the data attributes. Classical association rule mining model assumes that all items have same significance without assigning their weight within a transaction or record. This paper proposed method gives importance for the...

    Provided By Engg Journals Publications

  • White Papers // Aug 2013

    Cloud Computing: Securing Client Data Storage

    Within cloud computing environment, vibrant useful resource part and reallocation tend to be important, helpful and ultimately promote capital investment returns. This paper covers method inside situation associated with distributed cloud environment, which can be viewed as techniques wherever program developers can share distributed resources with better security. This paper...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Detection & Classification of Internet Intrusion Based on the Combination of Random Forest and Naive Bayes

    The Use of internet renders a network packets susceptible to attacks ranging from passive eavesdropping to active impersonation, message replay and message distortion. There is no clear description as to what packets can be considered normal or abnormal. If the intrusions are not detected at the appropriate level, the loss...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Wireless Sensor Network - A Survey

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Secure Tracking and Transport System Using RWP and GPS

    In the present era where technology has become a part of the people life, every day new applications are developed in every field to serve mankind. Many applications have been developed using GPS (Global Positioning System) such as aquatic and spacecraft routing, surveying and mapping, precise time reference etc. GPS...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Securing MANET From Blackhole and Wormhole Attacks

    Mobile ad-hoc networks are self-configuring and self-organizing multi-hop wireless networks. They do not have any fixed infrastructure or centralized management. Due to this, the ad hoc networks are vulnerable to attacks. The routing protocol for MANET considered in this paper is AODV (Ad-hoc On-demand Distance Vector routing protocol). Black hole...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Elastic Calculator : A Mobile Application for Windows Mobile Using Mobile Cloud Services

    Cloud computing is highly significant in this era as it always shows a way to increase the capacity or to add an additional features on the go and also it is worthy to extend these services to mobile devices. It is proposed to design and implement elastic calculator for mobile...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Resource Provisioning Using Batch Mode Heuristic Priority with Round Robin Scheduling

    Million numbers of these users tries to access the data in different type of applications like online shopping etc., which tends to increase the load on a single server. Increase of load on a server results in reduction of throughput and it leads to a strong need of developing and...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Database Synchronization of Mobile-Build by Using Synchronization Framework

    In this paper, the authors propose synchronization of mobile database with server database using Microsoft synchronization framework. It is a platform for data synchronization developed by Microsoft which is used to synchronize multiple data stores. The sync framework lists the each item in a data store which was recognized by...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Mining on Car Database Employing Learning and Clustering Algorithms

    In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the known learning algorithms used are Naive Bayesian (NB) and SMO (Self-Minimal-Optimization). Thus the following two learning algorithms are used on a Car review database and thus...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    RFID in Cloud Environment for Attendance Monitoring System

    RFID, primitively used for automatic identification and tracking has now been extensively used for remote storage and retrieval of the data. RFID is similar to barcode but are far more efficient, easy to manufacture, and can be used in environments hostile to barcodes. RFID comprises of a tag; usually sequestered...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    An Efficient TPD Scheduling Algorithm for Cloud Environment

    Cloud computing is a prominent way to support demand on services. It is a mode of computing where scalable resources are delivered as a service to customers over Internet. Scheduling in cloud is responsible for selection of best suitable resources for task execution, by taking some parameters and restrictions of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Realisation of Resourceful Data Mining Services Using Cloud Computing

    Data security and access control are the most challenging research work going on, at present, in cloud computing. This paper is because of the users sending their sensitive data to the cloud providers for acquiring their services. In cloud computing, the data is going to be stored in storage area...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Towards a Collaborative Learning Process Based on the Hybrid Cloud Computing and Web 2.0 Tools

    In this paper, the authors propose an online collaborative learning process composed of three iterative steps which mix the advantages of hybrid cloud computing, web 2.0 tools and the online questionnaire to improve the quality of the educational content of the course in the classroom. Indeed, it consists of transporting...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Web Page Segmentation for Small Screen Devices Using Tag Path Clustering Approach

    The web pages breathing these days are developed to be displayed on a desktop PCs and so viewing them on mobile web browsers is extremely tough. Since mobile devices have restricted resources, small screen device users need to scroll down and across the complicated sites persistently. To address the problem...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Assessment of Fraud Pretentious Business Region Research Articles Using Data Mining Approaches

    In any organization, fraud detection and prevention is daunting task because millions of dollars lost with the different nature of fraudulent activities. Organizations got to engage intelligent and innovative techniques to detect fraud at the earliest opportunity to protect business and their shareholders, customers and employees. This paper surveyed different...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Ternary Hierarchical Clustering with Data De-Duplication in Sensor Networks

    Wireless Sensor Network (WSN) is resource constrained application specific ad-hoc networks. All the previous works have concentrated on the power aware techniques such as data aggregation, coordination of node operations for effective routes and query processing etc. All these techniques have helped to collect and communicate the field data of...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    Fingerprint Verification System Using Support Vector Machine

    Efficient fingerprint verification system is needed in many places for personal identification to access physical facilities, information etc. This paper proposes robust verification system based on features extracted from human fingerprints and a pattern classifier called Support Vector Machine (SVM). Three set of features are fused together and passed to...

    Provided By Engg Journals Publications

  • White Papers // Jul 2013

    A Novel Approach for Software Implementation of Graphical Authentication Methodology

    The conventional method of authentication requires the user to remember a text based password which he enters in order to prove his legitimacy. Since security cannot be compromised, such passwords are usually lengthy and complicated else they would be cracked easily with various password hacking techniques. The user thus finds...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Survey on the Architectures of Data Security in Cloud Storage Infrastructure

    Cloud computing is a most alluring technology that facilitates conducive, on-demand network access based on the requirement of users with nominal effort on management and interaction among cloud providers. The cloud storage serves as a dependable platform for long term storage needs which enables the users to move the data...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    2CAuth: A New Two Factor Authentication Scheme Using QR-Code

    Password based schemes has been the standard means of authentication over decades. Enhancements use entities like ownership (something one possess), knowledge (something one knows), and inherence (something one is) as first factor and mobile phones as token less second factor, in combinations, to offer different levels of security assurances, trading...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Stationary Wavelet Transform Approach for Improved Fingerprint Recognition Scheme

    Fingerprint recognition, a known biometrics for personal identification is used in securing confidential data contents. Fingerprint exhibits textured like patterns of whorls, loop etc in sector form which is then used for fingerprint matching. The existing method uses Gabor filter which does not provide much Robustness. In this Paper, a...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Vertical Handoff Using the Application of Spanning Tree in 4 G

    Today mobile communication has an important place in every person life in their all business and non-business task. So it will be right to say there is some requirements such type of network. That would be credible or reliable and without the reliable network there can b arise many conflictions...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Enhancing Energy Efficiency of Routing Protocol Through Cross Layer Interactions in MANET

    Energy conservation is important for mobile ad-hoc networks where devices are expected to work for longer periods of time without the need for charging their batteries. High probability of disappointment in ad-hoc networks is due to energy-tired nodes, if some nodes expire early due to lack of energy, they cannot...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Online Malicious Attack Rectification in Wi-Fi Network

    Location estimation is important for many applications in wireless networks. Now-a-days it is being used for military applications and location tracking. RSSI is a measure of signal strength to estimate the distance and to detect intruder by using fingerprinting technique by setting RSSI threshold value. There exists several approaches for...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Hybrid Algorithm for Secure Communication Using Hermitian Matrix

    Currently secure communication is a very challenging task. Cryptography is providing solution to this challenge. But cryptography highly depends on invertible mathematical functions. Mathematical stuff embedded with computer model brings the unbreakable cryptosystem. Many algorithms are proposed in the literature and they are having their own limitations. In this paper,...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Enhanced Concert in Multi-Carrier Wireless System Using Rajan Transform

    Orthogonal frequency division multiplexing is a scheme of encoding digital information on numerous carrier frequencies. The orthogonality permits an proficient modulator and demodulator realization by means of FFT algorithm resting on receiver side, and inverse FFT resting on sender side. A substitute technique for orthogonal transmission and reception of data...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Efficient Resource Utilization Algorithm (ERUA) for Service Request Scheduling in Cloud

    Cloud computing provides the user with the massive pool of resources in terms of pay-as-you-use policy. Cloud delivers these resources on demand through the use of network resources under different load conditions. As the users will be charged based on their usage the effective utilization of resources poses a major...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Comparison of Probabilistic Optimization Algorithms for Resource Scheduling in Cloud Computing Environment

    Cloud Computing has significantly made its landmark in the field of information technology. A concept which initially stood nebulous is now used as a synonym for internet. It has paved a way to increase capacity as well as add capabilities on the fly without investing in new infrastructure, training new...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Analysis of DWT-OFDM and FFT-OFDM Systems

    Performance of Orthogonal Frequency Division Multiplexing (OFDM) systems using Fast Fourier Transforms (FFT) and Discrete Wavelet Transform (DWT) are analyzed in this paper. The performance of DWT-OFDM is assessed by various parameters such as BER, eye diagram and constellation diagram. BER is the ratio of the no. of bits with...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Effect of Four-Wave Mixing on Wdm System and Its Suppression Using Optimum Algorithms

    The phenomenon where an undesirable nonlinear effect gives significantly degraded system performance, and becomes the major drawback for optical communication systems is known as Four wave mixing. In order to achieve affordable BER and Q-factor, a comparison of a WDM system with equal and unequal channel spacing is performed. The...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Analysis of Hash Encrypted DWT-OFDM and Hash Encrypted FFT-OFDM Systems

    Orthogonal Frequency Division Multiplexing (OFDM), in the recent past is being preferably used in wireless communication because of its high data rate and its unique property of the transmitted symbols being mathematically orthogonal. This mathematical orthogonality allows signals with different frequencies to propagate in the same subcarrier unlike traditional Frequency...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Malwares Detection and Prevention Using Set Theory

    Dependence of electronic devices (viz. Computer, Laptop, Mobile, etc.) is increasing exponentially, so large amount of data and information are stored on electronic devices. These electronic devices are interconnected in local, national and international networks, use and share a high number of various software programs. Individuals, corporations, hospitals, communication networks,...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Solution for Network Life Time Problem Using Content Based Energy Efficient Routing Algorithm

    In this paper, the authors consider an overarching problem that encompasses both performance metrics. In particular, they study the network capacity problem under a given network lifetime requirement. Specifically, for a wireless sensor network where each node is provisioned with an initial energy, if all nodes are required to live...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Efficient QoS Mechanism for Multicast Routing With ODMRP in Wireless Adhoc Networks

    The wireless usage has increased rapidly and there is a huge shift in users' expectations. Ad hoc networks can provide better features if there is a proper QoS multicasting strategy developed. The On Demand Multicast Routing Protocol (ODMRP) is a group communication protocol with low control overhead. There are many...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    An Analysis of Current Computer Network Attack Procedures, Their Mitigation Measures and the Development of an Improved Denial of Service (DOS) Attack Model

    This paper presents the major network attack profiles, taxonomies, classification and identification frameworks. Further, current approaches for intrusion detection on networks were x-rayed though, with emphasis on Denial of Service (DoS) attacks only. The concept of intelligent agents and subsequently adaptive systems was elucidated, the properties derived were used as...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    SMTCI: Secure Multi-Trial Trust Evaluation and Cost-Effective Incentive Mechanism for Multi-Hop Cellular Networks

    In multi-hop cellular networks, finding an optimum and trusted route in the network through intermediate node is a major issue. At MCN, or the next-generation wireless networks, can significantly improve network performance and deployment and help implement many novel applications and services. However, when compared to wired and single-hop wireless...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    PAPR Reduction in OFDM Using Partial Transmit Sequence (PTS)

    In recent years, OFDM has gained a lot of interest in diverse-digital communication applications. This has been due to its favorable properties like high spectral efficiency and robustness to channel fading. Some of the major drawbacks in OFDM are its high Peak-to-Average-Power Ratio (PAPR) of the transmitted signals and the...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Fuzzy Modelling of a Network Denial of Service (DOS) Attack Phenomenon

    This paper presents the fuzzy modeling of a network Denial of Service (DoS) attack characteristics. Conventional methods for achieving same purpose were showcased. Also, the need for a fuzzy logic approach as well as an improved mechanism for generating the fuzzy inference rules were outlined. Further, the paper discusses the...

    Provided By Engg Journals Publications

  • White Papers // Dec 2012

    Study of Data Mining Approach for Mobile Computing Environment

    Efficient data mining techniques are required to discover useful information and knowledge. This is due to the effective involvement of computers and the improvement in Database Technology which has provided large data. The mobile data allocation scheme is proposed such that the data are replicated statically for traditional Databases' for...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    Survey on Security, Storage, and Networking of Cloud Computing

    Cloud architectures constitute cost-efficient moral fibers that will support the transmission, storage, and computing of the applications contents. These infrastructures can be used for scientific and pervasive computing purposes, business. The services delivered through cloud infrastructures increases their exposure to security incidents and attacks. The expenditure and intricacy reduction requirements...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    QoS - Continuous Lane Streaming in Road Network Security Measures in Wireless LAN Communication Network

    Wireless technology has become an important module for communication and for the data transmission. This technology has replaced the present LAN in terms of security and as well as with the data transfer. Wireless Local Area Network (WLAN) effectively satisfies needs within buildings and campus environments. Developing security measures for...

    Provided By Engg Journals Publications

  • White Papers // Jan 2013

    Survey of Genetic Based Approach for Multicast Routing in Manet

    An independent, self-governing group of mobile wireless hosts communicate through wireless links by forming a temporary network (Mobile Ad-hoc Network) in a dynamic manner without any fixed and centralized infrastructure. Since the nodes in MANET are not stationary, same path may not be taken always for routing between the sender...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Power Efficient NOC Router Design

    In this paper, the authors present the NOC router architecture with five port support which utilizes dual crossbar arrangement, the latency which arises due to the dual cross bar architecture is reduced by using predominant routing algorithm. This arrangement is more efficient and reduces about 10 % of device utilization...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Modified Low Energy Adaptive Clustering Hierarchy for Heterogeneous Wireless Sensor Network

    In wireless sensor network, it is an important task to collect the data periodically from various sensors node for monitoring and recording the physical conditions of the environment. The sensed data must be transmitted and received between the nodes in the network. The Low Energy Adaptive Clustering Hierarchy (LEACH) is...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Enhanced Router Design for Network on Chip

    Network on chip is a new paradigm for on chip design that is able to sustain the communication provisions for the SoC with the desired performance. NOC applies networking methodology concepts to system on chip data transfer and it gives noticeable elevation over conventional bus based communication. NOC router is...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Performance Analysis of Noc Architectures

    Network-on-Chip (NoC) architecture grants the communication frame work for SoC design .The Performance dominating factors of NoC are architecture, node's size, and the routing algorithm. Various routing algorithms are proposed for the router design in Network on Chip (NoC).According to the requirements of NoC application, analysis and simulations for various...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Path Selection: Reliability Service Curve Measurement to Enhance QOS in MANETs

    In Mobile Ad hoc NETworks (MANETs) the mobility of a node is unpredictable and the mobility is considered as one of the characteristics of a wireless network. A fundamental issue arising in MANETs is the selection of optimal path between any two nodes. A method that has been advocated to...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    A Neural Based Proposal for Scheduling of IEEE 802.16 Networks

    This paper is to survey the core issues in the design of schedulers for IEEE 802.16 networks and study the various techniques available in literature. Neural Networks have been utilized by researchers over the years to solve a large set of optimization problems in the field of active queue management...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    BER Performance Improvement Using MIMO Technique Over Rayleigh Wireless Channel with Different Equalizers

    Wireless communication using Multiple-Input Multiple-Output (MIMO) links has emerged as one of the most significant breakthroughs in modern communications because of the huge capacity and reliability gains promised even in worst fading environment. This paper presents an overview of some important behaviors of MIMO systems under Rayleigh channel environments. This...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    RF Coverage Estimation of Cellular Mobile System

    In the design of any cellular mobile system, the fundamental task is to predict the coverage of the proposed system. A wide variety of approaches have been developed over the years to predict coverage using propagation models. Propagation models are useful for predicting signal attenuation or path loss which may...

    Provided By Engg Journals Publications

  • White Papers // Nov 2012

    An Improved Profile-Based Location Caching with Fixed Local Anchor Based on Group Deregistration for Wireless Networks

    Profile-Based Location Caching with Fixed Local Anchor (PCFLA) Strategy helps to reduce the total location management cost by reducing the frequent access at HLR in wireless mobile network. The HLR is informed each time, whenever an MT moves from one LSTP region to another LSTP region. The old FLA and...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Control Overhead reduction: A Hierarchical Routing Protocol In Mobile Ad hoc Networks

    A novel self-organizing hierarchical architecture is proposed for improving the scalability properties of ad-hoc wireless networks. This paper focuses on the design and evaluation of routing protocols applicable to this class of hierarchical ad-hoc networks. The performance of a hierarchical network with the popular Dynamic Source Routing (DSR) protocol is...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Design and Simulation of Multiband Planar Inverted-F Antenna for Mobile Phone Applications

    The proposed multiband planar inverted-F antenna has a very simple structure. The antenna has only one layer so it is easy to fabricate. The size of radiating patch of proposed antenna is 20mm? 25mm, while the size of ground plane is 39mm?39mm and height of antenna is 3mm. Mathematical tools...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    A Bee-Hive Optimization Approach to Improve the Network Lifetime in Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), maximizing the lifetime is a challenging problem. The main task of a network is to receive information from node and transmit to base station for processing. If all nodes forward data packets directly to base station, they will drain their energy quickly. So, routing has...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Efficient Parallel Data Processing in the Cloud

    Cloud computing is a distributed computing technology which is the combination of hardware and software and delivered as a service to store, manage and process data. A new system is proposed to allocate resources dynamically for task scheduling and execution. Virtual machines are introduced in the proposed architecture for efficient...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Cryptography on Android Message Applications - A Review

    Short Message Service (SMS) is a text messaging service component of phone, web, or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. Security of SMS's is still an open challenging task. Various Cryptographic algorithms have been...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Distance Based Fault Detection in Wireless Sensor Network

    Wireless Sensor Network (WSNs) have become a new information collection and monitoring solution for a variety of application. In WSN, sensor nodes have strong hardware and software restriction in terms of processing power, memory capability, power supply and communication throughput. Due to these restrictions, fault may occur in sensor. This...

    Provided By Engg Journals Publications

  • White Papers // May 2013

    Design a Quadband Frequencies Microstrip Patch Antenna With Double CShaped Slot

    A quadband frequencies microstrip square patch antenna with double C-shaped slot at the patch is proposed in this paper. First, a rectangular shaped patch antenna is designed for 2.40 GHz frequency (WLAN application) with narrow bandwidth of 67 MHz (operate better than - 10 dB between 2.368 GHz and 2.435...

    Provided By Engg Journals Publications