Galgotias College Of Engineering And Technology

Displaying 1-26 of 26 results

  • White Papers // Apr 2013

    Monitoring Network Congestion Using Bees and SLAWAN Routing Protocols

    This paper proposes a hybrid routing protocol which is a combination of Wireless Ant Network based Routing Protocol (SLAWAN) and BeeHive based Routing Algorithm for decreasing route discovery latency in real time communications in high dynamic networks. The proposed algorithm splits the network into two parts; one is a fixed...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Symmetric Key Generation Algorithm Using Sum of Subset N-P Problem

    Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing....

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Vehicle Speed Violation Detection Using RF Communication

    Radio Frequency IDentification and detection (RFID) is an emerging technology that uses wireless radio to identify objects from a distance without requiring line of sight or physical contact. This study aims at assessing the feasibility of applying RFID for vehicle speed tracking purpose on the highway. Vehicle is given a...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Energy Efficient Rank Based Data Gathering in Wireless Sensor Networks

    Wireless sensor networks are emerging technology with the potential to change the way that the people live. This paper explains how each network as a system of tiny computers called motes and the parts of the network sends information or data to its corresponding network in energy efficient way. As...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    A Survey in Cloud Definition and Storage Technologies

    Cloud computing is a unique way to design and manage various computing resources remotely. Cloud Computing is the recent effort in delivering computing resources as a service. It represents a whole new concept as it moves the authors' thinking from computing as a product which they purchase to a whole...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Radio Frequency Identification (RFID): The Frequency of the Future

    RFID stands for Radio-Frequency IDentification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic strip on...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Existing Security Mechanisms in MANET

    Wireless mobile ad-hoc network is a group of mobile nodes connected with each other in a scattered manner. There is no fixed topology used to connect mobile nodes. In mobile ad-hoc networks the topology changes rapidly, due to movement of mobile nodes. Some protocols are invented for routing in mobile...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Bandwidth and Signal to Ratio Comparison of 16QAM and 64QAM Techniques for OFDM

    Modulation is one of the most important characteristics used in signal waveform identification for wireless communications. As the demand of high-quality service in next-generation wireless communication systems increases, a high performance of data transmission requires an increase in spectral efficiency and an improvement in error performance of wireless communication systems....

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Congestion Control Mechanism in Multicast

    Now-a-days, Computer networking plays an important role in day today life. The multimedia services uses the IP multicast which is often employed in Internet Protocol (IP) applications like Internet Protocol TeleVision (IPTV), Multiplayer Games, Streaming Media. With the emergence of new technologies like mobiles, smart phones, tabulates, laptops etc. The...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Detection and Resolution of Anomalies in Firewall Policy Rules

    A firewall is a system acting as an interface of a network to one or more external networks. It implements the security policy of the network by deciding which packets to let through based on rules defined by the network administrator. Any error in defining the rules may compromise the...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Handling Security Issues in Cloud Computing Using Tiny Algorithm

    Cloud computing is the result of evolution and adoption of existing technology and paradigms. The goal of cloud computing is to allow users to take benefit from all of these technologies, without having deep knowledge of these technologies. The cloud aims to cut costs, and help the users focus on...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Mutual Exclusion With Dynamic Request Set in Ad-Hoc Networks

    Mutual exclusion and resource allocation are some of the challenging problems in mobile ad hoc network. This paper addresses the mutual exclusion problem in the mobile ad hoc environment. It involves a group of processes, each of which intermittently requires access to the only resource present in the environment, which...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Proposed 4-Way Handshake Protocol for Authentication in Wpa2

    IEEE standard 802.11i is the latest standard for security in Wireless LAN (WLAN). This standard provides data confidentiality as well as integrity. The 802.11i 4-way handshake and key management stays secure against any attack the key used for this purpose is secure. But, availability is main issue because 802.11i is...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Data Security in Cloud Computing Using S-IDEA

    Cloud computing refers to computing facilities provided on demand, served over the Internet from shared data centers that exploit enormous economies of scale. This paper basically focuses on data security in cloud computing as there is a concern regarding user privacy protection and also protection against the new threats that...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Kerberos Authentication in Efficient Mobile Adhoc Environment With Clustering Mechanism

    Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Location of Sensor in Network-Based Intrusion Detection and Prevention System

    With the increase in networks connecting each and every computer, their security is gaining equal significance. An important problem to network services is cyber attacks. Intrusion detection is the act of detecting unwanted traffic on a network or a device. Intrusion prevention is the act of preventing or attempt to...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Security Issues of SIP Based VoIP System

    In this booming world of internet, telephone traffic is just another application running over it. Voice over Internet Protocol, also known as VoIP, is a technology used for transferring voice information using the Internet Protocol. The nature of packet network used by VoIP in general is that the data that...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    A Novel RSA -Shamir's Secret Sharing Scheme for Hierarchical Key Management in WSN's

    Although, the security in WSN's, in current literature, is being provided by symmetric and asymmetric both but in most cases symmetric key cryptography is used. The idea behind the use of symmetric key is the pre-distribution of keys before the deployment of wireless sensor nodes, but this technique is not...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    ZigBee Based Wireless Sensor Network Application for Monitoring Health Data of Elderly People

    Recent developments in wireless technologies and the fabrication of semiconductor miniature sensors are sizing wireless sensor networks smaller and more cost-effective for their applications in various fields of interest. The prospects for Wireless Sensor Network (WSN) technology are strong. Moreover, the ZigBee based WSN is capable to provide reliable, cost-effective,...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    MANET : All You Need to Know About It

    With the constant technological advancements, the era of wired networks are on a decline and the wireless network is overpowering its traditional counterpart. In recent years Mobile Ad hoc NETworks (MANETs) have become a very popular. Providing communications in the absence of a fixed infra-structure MANETs are an attractive technology....

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    RFID-Based Parts Tracking System

    Radio Frequency IDentification (RFID) is the next generation wireless communication technology applicable to various areas. For the beneficial features of RFID, the authors integrate RFID readers into the Material Tracking Information System. Challenges experienced in the port and shortcomings of manual based tracking systems necessitated to explore use of modern...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Home Appliances Control System Through Infra-red Using Mobile Devices

    This paper mainly focus on a simple but reliable approach to control home appliances. Home appliance control system is a legitimate need of people nowadays. Controlling appliances is a main part of automation. The main object of Home automation is to provide a wireless communication link of home appliances to...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Study of Comparison of Various Cloud Computing Simulators

    Green Cloud computing is one of the "Best Affordable Innovation" that is it is one of such technologies that completely fits into the pulse of business market and science and technology fields. The main objective of Green Cloud Computing is to fulfill and transform the base and framework of clouds...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Fractals in Network Traffic Engineering

    A fractal is a recursively generated object having a fractional dimension and self-similarity. It provides a good tool for modeling some of real world processes. Fractals have a wide variety of applications in the area of synthesis, analysis and miniaturization. In this paper, the authors provide a comprehensive overview of...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Searching in Peer to Peer Networks

    In this paper, the authors will apply the basic searching techniques in 2T-DHT networks. 2T-DHT are two tier networks containing two kinds of peers, that is normal peers and super-peers. These searching techniques have already been implemented in 1T-DHT which is a single tier network. The searching techniques are used...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Software Testing: An Approach Using Cloud Computing

    This is well known that every development activity requires the corresponding testing activity to ensure the quality and correctness of the software. Software testing plays an importance role to minimize the risk of failure of any developed application. Software testing requires some platforms through which the cycle of the testing...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Monitoring Network Congestion Using Bees and SLAWAN Routing Protocols

    This paper proposes a hybrid routing protocol which is a combination of Wireless Ant Network based Routing Protocol (SLAWAN) and BeeHive based Routing Algorithm for decreasing route discovery latency in real time communications in high dynamic networks. The proposed algorithm splits the network into two parts; one is a fixed...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Mutual Exclusion With Dynamic Request Set in Ad-Hoc Networks

    Mutual exclusion and resource allocation are some of the challenging problems in mobile ad hoc network. This paper addresses the mutual exclusion problem in the mobile ad hoc environment. It involves a group of processes, each of which intermittently requires access to the only resource present in the environment, which...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Proposed 4-Way Handshake Protocol for Authentication in Wpa2

    IEEE standard 802.11i is the latest standard for security in Wireless LAN (WLAN). This standard provides data confidentiality as well as integrity. The 802.11i 4-way handshake and key management stays secure against any attack the key used for this purpose is secure. But, availability is main issue because 802.11i is...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Data Security in Cloud Computing Using S-IDEA

    Cloud computing refers to computing facilities provided on demand, served over the Internet from shared data centers that exploit enormous economies of scale. This paper basically focuses on data security in cloud computing as there is a concern regarding user privacy protection and also protection against the new threats that...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Software Testing: An Approach Using Cloud Computing

    This is well known that every development activity requires the corresponding testing activity to ensure the quality and correctness of the software. Software testing plays an importance role to minimize the risk of failure of any developed application. Software testing requires some platforms through which the cycle of the testing...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Kerberos Authentication in Efficient Mobile Adhoc Environment With Clustering Mechanism

    Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Location of Sensor in Network-Based Intrusion Detection and Prevention System

    With the increase in networks connecting each and every computer, their security is gaining equal significance. An important problem to network services is cyber attacks. Intrusion detection is the act of detecting unwanted traffic on a network or a device. Intrusion prevention is the act of preventing or attempt to...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Security Issues of SIP Based VoIP System

    In this booming world of internet, telephone traffic is just another application running over it. Voice over Internet Protocol, also known as VoIP, is a technology used for transferring voice information using the Internet Protocol. The nature of packet network used by VoIP in general is that the data that...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    A Novel RSA -Shamir's Secret Sharing Scheme for Hierarchical Key Management in WSN's

    Although, the security in WSN's, in current literature, is being provided by symmetric and asymmetric both but in most cases symmetric key cryptography is used. The idea behind the use of symmetric key is the pre-distribution of keys before the deployment of wireless sensor nodes, but this technique is not...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Symmetric Key Generation Algorithm Using Sum of Subset N-P Problem

    Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing....

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Vehicle Speed Violation Detection Using RF Communication

    Radio Frequency IDentification and detection (RFID) is an emerging technology that uses wireless radio to identify objects from a distance without requiring line of sight or physical contact. This study aims at assessing the feasibility of applying RFID for vehicle speed tracking purpose on the highway. Vehicle is given a...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Energy Efficient Rank Based Data Gathering in Wireless Sensor Networks

    Wireless sensor networks are emerging technology with the potential to change the way that the people live. This paper explains how each network as a system of tiny computers called motes and the parts of the network sends information or data to its corresponding network in energy efficient way. As...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    A Survey in Cloud Definition and Storage Technologies

    Cloud computing is a unique way to design and manage various computing resources remotely. Cloud Computing is the recent effort in delivering computing resources as a service. It represents a whole new concept as it moves the authors' thinking from computing as a product which they purchase to a whole...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    ZigBee Based Wireless Sensor Network Application for Monitoring Health Data of Elderly People

    Recent developments in wireless technologies and the fabrication of semiconductor miniature sensors are sizing wireless sensor networks smaller and more cost-effective for their applications in various fields of interest. The prospects for Wireless Sensor Network (WSN) technology are strong. Moreover, the ZigBee based WSN is capable to provide reliable, cost-effective,...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    MANET : All You Need to Know About It

    With the constant technological advancements, the era of wired networks are on a decline and the wireless network is overpowering its traditional counterpart. In recent years Mobile Ad hoc NETworks (MANETs) have become a very popular. Providing communications in the absence of a fixed infra-structure MANETs are an attractive technology....

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    RFID-Based Parts Tracking System

    Radio Frequency IDentification (RFID) is the next generation wireless communication technology applicable to various areas. For the beneficial features of RFID, the authors integrate RFID readers into the Material Tracking Information System. Challenges experienced in the port and shortcomings of manual based tracking systems necessitated to explore use of modern...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Radio Frequency Identification (RFID): The Frequency of the Future

    RFID stands for Radio-Frequency IDentification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic strip on...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Home Appliances Control System Through Infra-red Using Mobile Devices

    This paper mainly focus on a simple but reliable approach to control home appliances. Home appliance control system is a legitimate need of people nowadays. Controlling appliances is a main part of automation. The main object of Home automation is to provide a wireless communication link of home appliances to...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Study of Comparison of Various Cloud Computing Simulators

    Green Cloud computing is one of the "Best Affordable Innovation" that is it is one of such technologies that completely fits into the pulse of business market and science and technology fields. The main objective of Green Cloud Computing is to fulfill and transform the base and framework of clouds...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Fractals in Network Traffic Engineering

    A fractal is a recursively generated object having a fractional dimension and self-similarity. It provides a good tool for modeling some of real world processes. Fractals have a wide variety of applications in the area of synthesis, analysis and miniaturization. In this paper, the authors provide a comprehensive overview of...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Existing Security Mechanisms in MANET

    Wireless mobile ad-hoc network is a group of mobile nodes connected with each other in a scattered manner. There is no fixed topology used to connect mobile nodes. In mobile ad-hoc networks the topology changes rapidly, due to movement of mobile nodes. Some protocols are invented for routing in mobile...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Bandwidth and Signal to Ratio Comparison of 16QAM and 64QAM Techniques for OFDM

    Modulation is one of the most important characteristics used in signal waveform identification for wireless communications. As the demand of high-quality service in next-generation wireless communication systems increases, a high performance of data transmission requires an increase in spectral efficiency and an improvement in error performance of wireless communication systems....

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Congestion Control Mechanism in Multicast

    Now-a-days, Computer networking plays an important role in day today life. The multimedia services uses the IP multicast which is often employed in Internet Protocol (IP) applications like Internet Protocol TeleVision (IPTV), Multiplayer Games, Streaming Media. With the emergence of new technologies like mobiles, smart phones, tabulates, laptops etc. The...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Detection and Resolution of Anomalies in Firewall Policy Rules

    A firewall is a system acting as an interface of a network to one or more external networks. It implements the security policy of the network by deciding which packets to let through based on rules defined by the network administrator. Any error in defining the rules may compromise the...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Handling Security Issues in Cloud Computing Using Tiny Algorithm

    Cloud computing is the result of evolution and adoption of existing technology and paradigms. The goal of cloud computing is to allow users to take benefit from all of these technologies, without having deep knowledge of these technologies. The cloud aims to cut costs, and help the users focus on...

    Provided By Galgotias College Of Engineering And Technology

  • White Papers // Apr 2013

    Searching in Peer to Peer Networks

    In this paper, the authors will apply the basic searching techniques in 2T-DHT networks. 2T-DHT are two tier networks containing two kinds of peers, that is normal peers and super-peers. These searching techniques have already been implemented in 1T-DHT which is a single tier network. The searching techniques are used...

    Provided By Galgotias College Of Engineering And Technology