EuroJournals

Displaying 1-40 of 910 results

  • White Papers // Oct 2012

    On the Use of Homomorphic Encryption to Secure Applications, Services, and Routing Protocols

    The trend towards delegating data processing and management to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication...

    Provided By EuroJournals

  • White Papers // Oct 2012

    A Cross-Layer Based Routing Protocol with Power Saving Technique in Ultra Wide Band (UWB) Ad Hoc Networks

    In conventional routing protocols, severe performance deterioration occurs due to lack of awareness of MAC specific constraints. The targeted routing protocol should consider the queuing delay variations among the different Access Category (AC) queues. Since the MAC specific parameters are highly variable, the behavior of the routing protocol has to...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Energy Aware Multi-Hop Multi-Path Hierarchical (EAMMH) Routing Protocol for Wireless Sensor Networks

    Routing protocols in Wireless Sensor Networks (WSNs) emphasize on data dissemination, limited battery power and bandwidth constraints in order to facilitate efficient working of the network, thereby increasing the lifetime of the network. In this paper, the authors present an Energy Aware Multi-hop Multi-path Hierarchical routing protocol (EAMMH). EAMMH protocol...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Design of Microstrip Patch Antenna for 3.6 GHz WIMAX Applications

    The antennas have properties and characteristics to ensure proper operation. The choice of the antenna should take into consideration the application. In the authors' case, the choice fell on the technology of microstrip antennas. The objective of this paper is the analysis, design and characterization of wide band planar antennas...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Reconfigurable High Performance Fault Detectable AES by Using Composite Fields

    With rapid increases in communication and network applications, cryptography has become a crucial issue to ensure the security of transmitted data. This paper provides an efficient VLSI architecture to increase the throughput and security of the Advanced Encryption Standard (AES) Algorithm. The existing architecture provide the Look up Table technique...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Geometrical Rotation Addressed Steganography Technique Using Matrix Embedding and Huffman Encoding

    This paper models an algorithm which will detect geometrical rotation transformation occurred if any, introduced by the intruder to the stego image. The Huffman encoded secret image is overlaid on the selected bits of all the channels of pixels of cover image through matrix embedding. The proposed work introduces less...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Viewpoint Based Reverse Semantic Traceability in Software Quality Requirement Engineering

    The objective of this paper is to propose a formal model of software requirement traceability with multiple viewpoints focusing the product qualities required by the customers. The various levels of abstraction and decomposition in the software modeling may bring new processes and constraints in the analysis phase from different viewpoints....

    Provided By EuroJournals

  • White Papers // Sep 2012

    Performance Study on Routing Protocols in Adhoc Networks

    Adhoc network consist of set of mobile nodes with the complex wireless links, the network topology will be dynamic in nature. Routing protocol that find a path to be followed by data packets from source node to destination node used in traditional wired network cannot be directly applied in ad...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Comparison of BGP and TARRP for Large Scale VPN

    A network which merges the usages of the public and the private networks and uses security software for the purpose of compressing, encrypting and masking the digital packets that are being transmitted in the network is called as Virtual Private Network (VPN). In VPN, the communication between the two user...

    Provided By EuroJournals

  • White Papers // Sep 2012

    QoS Management in VoIP Security Using Stream Cipher

    Voice over Internet Protocol (VoIP) is a form of voice communication that uses audio data to transmit voice signals to the end user. VoIP is one of the most important technologies in the world of communication. Most of the research survey of Voice over IP security mainly discussed about the...

    Provided By EuroJournals

  • White Papers // Sep 2012

    CL-S-ODMRP- A Cross Layered Secure ODMRP for Achieving High-Throughput in Wireless Networks

    Multicasting process can render efficient support to a range of applications featuring close degree collaborations in several ad hoc applications currently envisaged. Multicasting services of proven worth are provided through well established routing protocols in the wired networks. Progressive increase in the mobility of the nodes necessitates these protocols to...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Ant Colony Optimization of Vertical Links for Efficient 3D NoC

    The applications of network on chip has become wide .However, the implementation of 3D NoC has become a vital issue with the fabrication of TSV. Hence, this paper focuses on the means of reducing the number of vertical links in order to reduce the TSV. The optimum number of vertical...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Analysis of Underwater Environment and Establishment of Underwater Wireless Optical Communication Link

    A major challenge facing ocean exploration and surveillance is how to quickly and accurately communicate the data obtained by the sensors or unmanned system to a surface ship or shore-based station. The primary reason for this challenge is that radio frequency waves do not propagate well underwater. And acoustic waves...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Link Quality Based Multipath Routing Protocol in Wireless Mesh Networks

    In Wireless Mesh Networks (WMNs), the source relies on intermediate nodes to reach the destination. As a result, failure in a node greatly affects the transmission of data. To overcome this drawback, multiple paths are required to favor the data transmission without any obstruction. In this paper, the authors propose...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Simultaneous Multi-Path Transmission for Burst Loss Recovery in Optical Burst Switching (OBS) Networks

    In Optical Burst Switching (OBS) networks, issues related to burst losses are of major concern. Burst contention recovery techniques are needed in the OBS layer in order to reduce random burst-contention losses, thereby improving the transmission reliability of OBS networks. The existing works rarely consider the burst loss and loss...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Logical Tree Based Routing for Energy Efficient Wireless Sensor Networks

    Wireless Sensor Network (WSN) is set of thousands or more micro sensor nodes having the capability to process gather and transmit data to any one of the designed base station. WSN is that they have limited battery power, storage and data processing capabilities. Out of these the primary challenge is...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Inter-Process Communication with Network-on-Chip Using CDMA Technique

    In this paper, a novel implementation of CDMA NoC is proposed. Performance analysis is done for the physical design parameters of CDMA NoC. The present work retains the advantages of serial transmission without the need for a specialized serializer and de-serializer. The asynchronous circuit design with combinational logic (Gate level...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Monitoring and Diagnosis of Multi-Agent Plan: Centralized Approach

    Recently, a number of model-based approaches to monitoring and diagnosis of a Multi-Agent Plan (MAP) have been proposed; this fact signifies that the Artificial Intelligence (AI) community is interested in systems where activities are executed simultaneously by various agents. The current paper introduces a centralized approach for plan execution monitoring,...

    Provided By EuroJournals

  • White Papers // Oct 2012

    Combinational Adaptive Advanced Scheduling Algorithm for Grid Networking

    Scheduling is a fundamental issue in achieving high performance on metacomputers and computational grids. For the first time, the job scheduling problem for grid computing on metacomputers is studied as a combinatorial optimization problem. The efforts to construct a national scale grid computing environment have brought unprecedented computing capacity. Exploiting...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Efficient Information Retrieval Using Hybrid Factors Based Caching System

    Web is a valuable source of information and it is expanding at an enormous speed. Web Information Retrieval is the application of Information Retrieval concepts to the World Wide Web. In web information retrieval the caching is a crucial performance component of large-scale web search engines, as it greatly helps...

    Provided By EuroJournals

  • White Papers // Sep 2012

    A Novel Multi Resonant Comb-Shaped Patch Antenna for Pervasive Wireless Communications

    A novel simple multi resonant comb-shaped patch microstrip antenna for multi functional wireless communications bands is presented and simulated. This new structure is fed by a microstrip line. A parametric study of the multi resonant comb-shaped patch antenna is presented and effect of the size of the slots on return...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Effective Data Bunch for Transportable Sample in Wireless Sensor Networks

    Mobile objects can be used to gather samples from a sensor field. Civilian vehicles or even human beings equipped with proper wireless communication devices can be used as mobile sinks that retrieve sensor-data from sampling points within a large sensor field. A key challenge is how to gather the sensor...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Secured Information Transferring Using Secured Cryptosystem

    This paper presents the implementation of a secure application for transferring information from source to destination. Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Energy Efficient Rekeying Approach for Dynamic Membership Changes in Group Key Management

    Providing Security is mandatory in reliable group communication over open networks in order to prevent intruder attack. To provide privacy and integrity in group communication, the members of the group generates a common secret key called group key for the entire group and it can be used for encrypting the...

    Provided By EuroJournals

  • White Papers // Sep 2012

    User Interest Based Web Usage Mining Using a Modified Bird Flocking Algorithm

    Web mining is become a key research area because of the incremental use of web application and web services in the internet. The web mining gets special attention since most of the web sites accurse the user data and user details. The web mining process mainly deals with three categories:...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Efficient Cluster Based Privacy Preservation Data Perturbation Technique in Multi-Partitioned Datasets

    Multi-partitioned data includes both horizontal and vertical data sets which are recent stipulate of e-commerce and e-business data mining environment. In e-business data mining representation, privacy turns into a key concern in defending individual's data on service/product transactions. Nevertheless the precision and revelation of the service/product enhance the amount of...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Ber Performance of HARQ MIMO-CDMA Systems in Multi User Environment

    A new method for designing the spreading permutations based on space time block code matrices for MIMO-CDMA systems has been proposed. In Code Division Multiple Access (CDMA) systems, the calculated parity bits are used to select a spreading sequence from a set of mutually orthogonal spreading sequences. This paper focuses...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Cloud Computing Based Optimized Sensor Nodes for Effective Data Management

    The security problem with cloud computing is based on the fact that the application is open to anyone. Without security measures, the cloud computing application is vulnerable to attacks from hackers .Cloud computing or Internet developers have to make sure that they build a secured website for their users. The...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Performance Enhancement in Cloud Computing Using Reservation Cluster

    Through cloud computing the computing resources and services can be efficiently delivered and utilized, making the vision of computing utility realizable. In various applications, execution of services with more number of tasks has to perform with minimum inter-task communication. The method to make the most of a diverse set of...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Fault Tolerant Most Fitting Resource Scheduling Algorithm (FMFRS) for Computational Grid

    In computational Grid, fault tolerance is an imperative issue to be considered during job scheduling. Due to the widespread use of resources, systems are highly prone to errors and failures. Hence fault tolerance plays a key role in grid to avoid the problem of unreliability. The two main techniques for...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Image Encryption Using Chaos Theory

    Image encryption is not a very developed field yet plays a role in a number of vital industries. Most Image based encryptions use Block Algorithms like DES, which are suitable for Text Encryption. These algorithms if implemented for image are vulnerable to statistical attacks. In this paper, the authors introduce...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Federated Data Management in Distributed Mobile Cloud

    The rapid growth in the wireless communication and advancement in mobile devices offer infinite services over mobile cloud environment. However, a mobile cloud faces different challenges such as scarce bandwidth, limited energy, vendor lock-in due to dependency on single service provider, frequent disconnection of the database server and mobile devices....

    Provided By EuroJournals

  • White Papers // Sep 2012

    Energy Effeciency in Visual Sensor Networks: A Survey

    Visual Sensor Networks is a valuable technology to support many applications in different areas, such as: environmental and habitat monitoring, surveillance, smart homes for elderly care and kinder garden, smart meeting rooms including teleconferencing and virtual studios, virtual reality with telepresense systems, disaster management and so on. Participating nodes in...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Effect of Web Dimensions on the Critical Buckling Stress of T Sections Under Axial and Combined Loads

    The aim of this paper is to clarify the influence of different levels of initial imperfections and the effect of web dimensions for T stiffener on the estimation of the critical buckling stress of stiffened panels under axial and combined loads using Ansys software. The post buckling behavior of the...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Fuzzy Based Security Model to Detect Compromised and Selfish Nodes to Mobile AD HOC Network

    Mobile Ad-hoc NETwork (MANET) is an infrastructure less network on which mobile devices are connected between each other through wireless links. The growth of laptops and 802.11/Wi-Fi had made MANET a popular research topic since the middle of 1990's.Researchers started working. The security is one among the major issues since...

    Provided By EuroJournals

  • White Papers // Sep 2012

    Memory Efficiency of Multiple Pattern Matching for Network Security Using Extend Finite State Machine

    Network devices are increasingly using packet content for processing incoming or outgoing packets. Deep packet inspection, as the process is called, arises as networks incorporate increasingly sophisticated services into their infrastructure-true. Such services use application-specified data found in packet payloads, for example, to make routing decisions, to block or rate-limit...

    Provided By EuroJournals

  • White Papers // Sep 2012

    A Fault Tolerant Multipath Routing Protocol for Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are self-configuring networks that designing an efficient routing is one of the most important challenging issues of them due to nodes mobility and wireless communications. Frequently changing topology and high fault and failure probability in MANETs lead to perform frequent routing procedures and consequently cause considerable...

    Provided By EuroJournals

  • White Papers // Aug 2012

    Intelligence Driven Information Retrieval Framework for e-Governance

    E-governance system promotes transparency, quick access to information but it lacks human-machine interpretation. Semantic Web based solutions for E-Governance provide real time intelligence by making the machine understand the information and takes intelligent decision by integrating heterogeneous data from distributed sources in more autonomous way. In existing E-Governance, duplicate information...

    Provided By EuroJournals

  • White Papers // Aug 2012

    Service Based Architecture in Healthcare Domain Using Fingerprint Image Identification

    The Service Oriented Architecture (SOA) facilitates the development of systems by supporting modular design, application integration and software reuse. Healthcare is going to change the way how patients and healthcare providers interact. The exchange of confidential and integrate information is one of the major open issues for the health care...

    Provided By EuroJournals

  • White Papers // Aug 2012

    An Enhanced Wireless Data Acquisition for Real-Time Applications

    The objective of this paper is intelligent remote monitoring technology used in the embedded system of data acquisition for monitoring the output parameters. The new data-acquisition system integrates signal conditioning and processing function into a single board based embedded system by wireless technology using Wi-Fi. The existing DAQ data-acquisition systems...

    Provided By EuroJournals