International forum of researchers Students and Academician

Displaying 1-40 of 553 results

  • White Papers // Nov 2014

    Reconfigurable Efficient Design of BCH Encoder for Communication Systems

    In this paper, the authors propose a design and FPGA implementation of SISO BCH encoder. FPGA's are reprogrammable and they require shorter testing and debugging times, thus making them increasingly popular for rapid hardware prototyping. Reconfigurable systems also offer the potential of accelerating or speeding up the algorithms to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Blackhole Attack Putting into Practice in AODV Routing Protocol

    An ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. Because of security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Classification of TCP Variants Inside Wireless Networks

    TCP is transmission control protocol in TCP/IP protocol suite which provides end to end, connection-oriented and reliable packet delivery services in computer network. TCP provides services to both wired and wireless networks. The performance of TCP in wired network is optimized. While in wireless network the nodes are dynamic in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    A Review of Data Structures Used in Finding Frequent Itemsets Quickly

    In databases or data warehouse records the relevance between interesting mutual relationships amongst the attributes has gained a lot of focus now-a-days. The main research in this area is the Mining of association rules. To mine the association rules, it is important to generate the frequent itemsets. The efficiency of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Sybil Attack Detection in MANET

    In this paper, the authors propose a scheme to detect the mobile identities of Sybil attackers in urban or congested areas. Fully self-organized Mobile Ad hoc NETworks (MANETs) represent complex distributed systems. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Grid Topology Based Performance Analysis of TCP Variants with Routing Protocol

    TCP is being used as a highly reliable end-to-end protocol for transporting applications. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. But TCP performance in wireless networks suffers from significant throughput...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Different Approaches to Construct Collaborative Environment and Real Time Collaborative Editing

    A collaborative system is one where multiple users or agents engage in a shared activity, usually from remote locations. In the larger family of distributed applications, collaborative systems are distinguished by the fact that the agents in the system are working together towards a common goal and have a critical...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    An Intuitionistic Fuzzy C-Means Clustering Algorithm with Point Symmetry Distance Measure

    Clustering is a fundamental problem in data mining with innumerable applications spanning many fields. In organize to scientifically recognize clusters in a data set, it is typically essential to initial describe a measure of resemblance or nearness which will set up a rule for transmission patterns to the area of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Improving Cluster Quality for Prediction of User Behaviors Using CTMSP Mining

    Increasing popularity of wireless technology leads to research in mining and prediction of mobile movements and associated transactions. Discovery of mobile patterns from logs may not be precise enough for predictions since the varying mobile behaviors among users and temporal periods are not considered. In this paper, Hubert's gamma statistics...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    A Topic Model Approach Towards Contextual Advertisement Mining

    Online contextual advertisement has a great advantage over internet services, and has major role in shaping the web economy. Contextual advertising is a type of online advertising in which the commercial textual advertisement is placed within a web page based on the relevance of the advertisements to the page content....

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Review On: Content Extraction Through Web Mining & Hidden Web Mining

    Web mining is the application of data mining techniques to extract useful knowledge from web data, including web pages, hyperlinks between documents, usage logs of web sites & web pages, etc. This paper focus on three different categories of web mining - web content mining, web structure mining and web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Multiple Linear Regression in Data Mining

    From a statistical perspective data mining can be viewed as computer automated exploratory data analysis of large complex data sets. Despite the obvious connections between data mining and statistical data analysis, most of the methodologies used in data mining have so far originated in fields other than statistics. This paper...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Two Phase Watermarking for Security in Database

    Digital multimedia watermarking technology had suggested in the last decade to embed copyright information in digital objects such as images, audio and video. However, the increasing use of relational database systems in many real-life applications created an ever-increasing need for watermarking database systems. As a result, watermarking relational database systems...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Review Study of Behavioural Biometric Techniques for User Authentication

    Most of the existing authentication system has certain drawbacks for that reason graphical passwords are more suitable authentication system where users click on images to authenticate themselves. A necessary usable goal of an authentication system is to support users for selecting the better password. User creates unforgettable password which is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Implementation and Analysis of WiMAX Module for Reactive and Proactive Routing Protocols under ns2

    Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position WiMAX are considered to be the special application of infrastructure-less wireless Mobile Ad-hoc NETwork (MANET). In these networks, the speed of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Temporal Association Rule Mining in Soft Computing Framework: A Survey

    In this paper, the authors provide a survey of association rule mining in soft computing framework especially in fuzzy genetic paradigm based on temporal behavior of the transactions. Soft computing tools and its hybridization provides a great potential to come up with rules with greater confidence value than the apriori...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Developing a Teaching Methodology in the Time of Life of Cloud Computing

    The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Sep 2014

    Temperature Sensing based on Industrial automation by using Zigbee and Infrared

    Any object will produce infrared radiation when its temperature is above absolute zero. The intensity of the infrared radiant energy emitted by the object and its temperature is proportional. The temperature of the object is stronger than the energy of the infrared radiation emitted. In the industrial field, long running...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Survey on Clustering, Classification and Frequent Item-Sets with Its Applications

    Data mining is having techniques like clustering, classification and algorithm like frequent itemset mining algorithms. In this paper, the authors discuss about clustering and classification techniques with its applications and frequent itemset mining algorithm with its applications. Cluster is the process for set of objects in cluster that objects are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Survey of Mobile Cloud Computing (MCC): Applications and Security Issues

    Even though increasing usage of mobile computing, misusing its full potential is difficult due to its essential problems such as insufficiency of resources, regular interruptions, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers outside to the mobile device, Together with an explosive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Implementation and Performance Analysis of Mobile Cloud Computing Based on Java and Cloud Analyst

    Cloud computing is recognized as a revolution in the computing area. As predicted by the researcher, mobile phones will overtake PCs as the most common web access devices worldwide by 2013. Due to the increase of mobile network infrastructures, they are becoming popular clients to use web resources and especially...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Comparative Study of Different PAPR Reduction Techniques of OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is considered to be a promising technique against the multipath fading channel for wireless communications. However, the main drawback of OFDM system is the high Peak to Average Power Ratio (PAPR) of the transmitted signals system which leads to power inefficiency in RF section of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Evaluation of Dynamic Routing Protocols with Packet Tracer: RIP and EIGRP

    In this paper, performance analysis of the wired computer networks for combination of conventional model of RIP and EIGRP is evaluated through simulation which has been attempted using packet tracer as simulating tool. The Routing Information Protocol (RIP) is one of the first widely used routing protocols. RIP takes the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Routing Metrics and Global Load Balancing Mechanism In Wireless Sensor Networks

    Wireless sensor networks have received increasing attention in the recent few years. In many military and civil applications of sensor networks, sensors are constrained in onboard energy supply and are left unattended. Wireless Sensor Networks (WSNs) require appropriate protocols that make judicious use of the finite energy resources of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Security and Quality of Service Improvement In Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a group of sensors that are geographically distributed and interconnected by wireless networks. There exists a tradeoff in the form of security issues such as data integrity, confidentiality, and freshness in data aggregation that increase manifold when the WSN is deployed in a remote...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Hierarchical Clustering Approach to Reduce Message Collision in Wireless Mesh Network

    Wireless Mesh Networks (WMNs) is part of ad-hoc network. WMNs are undergoing rapid progress and inspiring numerous applications. In this paper, the authors are working on path selection protocol of WMNs. The path selection protocol has various issues like power consumption, congestion control, and load balance and message collision. Here,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    An Effective Approach to Improvise the Lifetime of Network by almost Delaunay Triangulation

    Wireless Sensor Networks (WSNs) gained its limelight because of the usage of low-cost and communicable intelligent sensors. When the nodes begin to communicate with each other, obviously the energy level drops out, since the battery backup is limited. This is a critical issue needs to be handled. The authors propose...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Study on Adaptive Position Update for Geographic Routing in Manets

    In geographic routing, nodes need to maintain up-to-date positions of their immediate neighbors for making effective forwarding decisions. Periodic broadcasting of beacon packets that contain the geographic location of the nodes is a popular method used by most geographic routing protocols to maintain neighbor positions. A node transmits its next...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Accessing Cloud Storage by Group Members with Secure Dynamic User Registration and Revocation

    Cloud computing is one of the computing concepts that involves a large number of computers connected through a real-time communication network such as the Internet. Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing storage,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Novel Secure Watermarking Scheme for RDBMS

    Database watermarking is to generate robust and persistent watermark for database. Watermarking for relational databases emerged as a vital solution to provide copyright protection, tamper detection and to maintain the integrity of data. An important area such as payroll, inventory, students' marks, defense and finance requires reliable scheme for checking...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Impact of Data Mining Technology in E-Commerce Environment

    Internet has grown so vast these days and brought so many opportunities in the field of business and has become the cause of development of enterprises. Web information mining has become vital in the status of e-commerce websites. The data mining helps in deciding the development factor of the organizations....

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Unsupervised Classification with Entropy Approach Using D & C Approach For Mixed Data Type Attributes

    The grouping or unsupervised classification has variety of demands in which the major one is the capability of the chosen clustering approach to deal with scalability and to handle with the mixed variety of data set. There are variety of data sets like categorical/nominal, ordinal, binary (symmetric or asymmetric), ratio...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Fast Fuzzy Based Unsupervised Classification: Using D & C Approach for Mixed Large Data Attributes

    The clustering or unsupervised classification has variety of requirements in which the major one is the capability of the chosen clustering approach to deal with scalability and to handle with the mixed variety of data set. The present scenario of variety of latest approaches of unsupervised classification are swarm optimization...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Classification of Criminal Data Using J48-Decision Tree Algorithm

    In recent years, amount of crime has become a serious problem in most of the countries. Now-a-days, criminals have maximum use of modern technologies to commit the crime and investigators on the other hand are still using traditional manual processes, for example First Information Report (FIR) to analyze the suspect...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Novel Framework for Inductive Learning From Imbalanced Data Sets Using Uniform-Sampling

    The class imbalance situations, where one class is rare compared to the other, arise frequently in machine learning applications. Unbalanced dataset learning is a new paradigm of machine learning which has applicability in real time, since all the datasets of real time are of unbalanced in nature. Researchers have rigorously...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Role of Concept Based Mining Model in Enhancing Web Document Clustering

    Existing text mining techniques captures the importance of a term (word or phrase) using term frequency at document level only. The text mining techniques should capture the meaning or semantics of a text also. In this paper, a new concept-based mining system is introduced which analyzes the terms on sentence,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Dimensionality Reduction in Web Page Classification

    Internet provides millions of web pages for each and every search term and it is a powerful medium for communication between computers and accessing online documents but tools like search engines assist users in locating and organizing information. Web page classification is one of the essential techniques for web mining...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    DRM Architecture to Distribute and Protect Multimedia Contents

    In this paper, the authors propose architecture for distributing and managing digital contents, combining traditional access control and Digital Rights Management (DRM) aspects, which executes the content usage control. The architecture defines security policies to establish access rights to protected content and to establish licenses to control the use of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Content Sharing over Smartphone Based on Delay Tolerant Networks

    Delay tolerant network is evolving class of wireless ad hoc network that may or may not have infrastructure. In years DTN has found application in sensor network for monitoring ecological environment, people net, ocean sensor network, vehicle network, military ad hoc network, disaster recovery networks, rural communication network etc. DTN...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Cloud Computing and Information Security: Is Compromise Inevitable?

    Today, generally many largest software companies operate almost entirely in the cloud. Despite well established business and technical advantages of cloud computing, many potential cloud users have yet to join the cloud, and those major corporations that are cloud users are for the most part putting only their less sensitive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Analysis of Document Retrieval System

    In this paper, the authors provide analysis of document retrieval system using Lucene. This paper also describes development and implementation of document retrieval system based on content of document using Lucene technology. It explains significance of Term frequency and Inverse document frequency in Lucene's document scoring formula. Lucene is a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Fine Grained Partitioning for Transactional Database Using Lookup Table

    In web and OLTP databases, the most common strategy for scaling database workload is to horizontally partition the database using hash or range partitioning. It works well in many simple applications such as an email application. In other applications like social networking, workloads involving many-to-many relationships are hard to partition....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Mining: Tools and Techniques

    The data collected from different applications require proper mechanism of extracting knowledge/information from large repositories for better decision making. Knowledge Discovery in Databases (KDD), often called data mining, aims at the discovery of useful information from large collections of data. Data mining is the process of finding new patterns from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a \"Data rich but information poor\" dilemma, data mining emerged. Web mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Web Usage Mining: Pattern Discovery and Forecasting

    Web usage mining: automatic discovery of patterns in click-streams and associated data collected or generated as a result of user interactions with one or more web sites. In this paper, the authors describe web usage mining for their college log files to analyze the behavioral patterns and profiles of users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Enhanced Text Document Classification based on Terms and Synonyms Relations

    Data mining is a rapidly developing area in recent years, due to the availability of huge amount of data and the need for converting such data into useful information and knowledge. Now-a-days, a large portion of the information is stored in text databases, which consists of large collections of documents...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Implementation of Energy Efficient Adaptive MAC Protocol for Wireless Sensor Network

    Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, low sensing ranges result in dense networks and thus it becomes necessary to achieve an efficient medium-access protocol...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Development of Mote for WSNs

    In this paper, the authors present design and development of mote for Wireless Sensor Network (WSN). The node is equipped with sensors to sense the temperature and humidity of the environment. An embedded wireless sensor node has been developed by using AVR Atmel AT89S52 microcontroller and Zigbee transceiver as wireless...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Implementation of BCD to Seven Segment Display Decoder Using SIMULINK Model

    Displaying of information in public places like banks, offices, airports etc. is a very important issue now-a-day. Numbers and alphabets can be displayed by using devices that use LEDs and LCDs. The internal circuits normally works with binary and ASCII codes which only uses two symbols, zero and one. Displaying...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Implementation of 8-Bit Multiplier in Verilog Using Reversible Logic Gates

    Reversible logic gates are very much in demand for the future computing technologies as they are known to produce zero power dissipation under ideal conditions. A digital combinational logic circuit is reversible if it maps each input pattern to a unique output pattern. Such circuits are of interest in quantum...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Home automation System Using Cloud Computing and Mobile Devices

    Home automation, as a model of pervasive computing, is progressively becoming substantial for people homed in developed societies. With the proliferation in the usage of household electronic and electrical appliances, numerous data and multifarious control-slevycumbersome burden on residential home automation control units, making it expensive and difficult for the users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Embedded System for Earthquake Victims

    The unprecedented scale and number of natural and man-made disasters in the past decade has urged International emergency search and rescue communities to seek for novel technology to enhance operation efficiency. Embedded search and rescue system that can navigate into material to search for victims and transfer critical field data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Comparative Study of FPGA Based Systems

    In this paper, the authors review the Field Programmable Gate Array (FPGA) with the focus on FPGA-based systems. The over view of FPGA and FPG A programming is represented in the literature. FPGA-based neural networks are provided in order to highlight the best advantage by using FPGA with this type...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Survey of Mobile Cloud Computing (MCC): Applications and Security Issues

    Even though increasing usage of mobile computing, misusing its full potential is difficult due to its essential problems such as insufficiency of resources, regular interruptions, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers outside to the mobile device, Together with an explosive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Implementation and Performance Analysis of Mobile Cloud Computing Based on Java and Cloud Analyst

    Cloud computing is recognized as a revolution in the computing area. As predicted by the researcher, mobile phones will overtake PCs as the most common web access devices worldwide by 2013. Due to the increase of mobile network infrastructures, they are becoming popular clients to use web resources and especially...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Comparative Study of Different PAPR Reduction Techniques of OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is considered to be a promising technique against the multipath fading channel for wireless communications. However, the main drawback of OFDM system is the high Peak to Average Power Ratio (PAPR) of the transmitted signals system which leads to power inefficiency in RF section of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Evaluation of Dynamic Routing Protocols with Packet Tracer: RIP and EIGRP

    In this paper, performance analysis of the wired computer networks for combination of conventional model of RIP and EIGRP is evaluated through simulation which has been attempted using packet tracer as simulating tool. The Routing Information Protocol (RIP) is one of the first widely used routing protocols. RIP takes the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Routing Metrics and Global Load Balancing Mechanism In Wireless Sensor Networks

    Wireless sensor networks have received increasing attention in the recent few years. In many military and civil applications of sensor networks, sensors are constrained in onboard energy supply and are left unattended. Wireless Sensor Networks (WSNs) require appropriate protocols that make judicious use of the finite energy resources of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Security and Quality of Service Improvement In Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a group of sensors that are geographically distributed and interconnected by wireless networks. There exists a tradeoff in the form of security issues such as data integrity, confidentiality, and freshness in data aggregation that increase manifold when the WSN is deployed in a remote...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Hierarchical Clustering Approach to Reduce Message Collision in Wireless Mesh Network

    Wireless Mesh Networks (WMNs) is part of ad-hoc network. WMNs are undergoing rapid progress and inspiring numerous applications. In this paper, the authors are working on path selection protocol of WMNs. The path selection protocol has various issues like power consumption, congestion control, and load balance and message collision. Here,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    An Effective Approach to Improvise the Lifetime of Network by almost Delaunay Triangulation

    Wireless Sensor Networks (WSNs) gained its limelight because of the usage of low-cost and communicable intelligent sensors. When the nodes begin to communicate with each other, obviously the energy level drops out, since the battery backup is limited. This is a critical issue needs to be handled. The authors propose...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Study on Adaptive Position Update for Geographic Routing in Manets

    In geographic routing, nodes need to maintain up-to-date positions of their immediate neighbors for making effective forwarding decisions. Periodic broadcasting of beacon packets that contain the geographic location of the nodes is a popular method used by most geographic routing protocols to maintain neighbor positions. A node transmits its next...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Optimization of Leach Protocol: Hybrid Leach

    Continuous advancement in wireless communication has enabled the deployment of wireless sensor networks for environment monitoring. The use of wireless sensor networks is increasing day-by-day and at the same time, it faces the problem of energy constraints in terms of limited battery lifetime & with the developments of wireless sensor...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Evaluation & Analysis Study of Multi Hop TSRT- Lightweight Time Stamp Synchronization Approach in WSNs

    Time synchronization for Wireless Sensor Networks (WSNs) has been studied in recent years as a fundamental and significant research issue. Time synchronization in a WSN is a critical for accurate time stamping of events and fine-tuned coordination among the sensor nodes to reduce power consumption. Time synchronization in WSNs is...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    5G Wireless Technologies - Still 4G Auction Not Over, But Time to Start Talking 5G

    The evolution of wireless telephone technologies can be discretely grouped into various generations based on the level of maturity of the underlying technology. The wireless industry is busy with the standardization of the 4th generation cellular networks. However, it represents a perspective which is commonly agreed upon, both by industry...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    An Efficient Approach for Node Deployment in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) consists of a huge number of small sensor nodes that senses environmental information and sends data to sink node through wireless links. The foremost challenge faced by micro sensor nodes is the need for significant reduction in energy consumption to ensure their longer usability. A...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Data Refuge in Unreliable Cloud Using Access Control and Access Moment

    In this paper, the authors focus on cloud data storage space defense, having persistently been an significant attribute of quality of service data owner's stores encrypted file in the cloud to ensure security for their data in the cloud computing environment and issues decryption key to only authorized user to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Internet Banking Authentication Methods

    The electronic banking and payments services of commercial banks are recognized by the Central Bank of India. Despite the early stage of electronic banking in India, banks are already offering various financial services through the internet. In order to protect customers' vital information and identities over the internet, necessary and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A Review and Comperision of Wireless Ad-Hoc Networks

    Today's, internet has been developed for more than forty years. Recently many network researchers are studying networks based on new communication techniques, especially wireless communications. Wireless networks allow hosts to roam without the constraints of wired connections. People can deploy a wireless network easily and quickly. End users can move...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Error Analysis in Multi Carrier Multi User Wireless Network with and without Pre-Coding

    In this paper, the authors are used in improving diversity of multi-user system from the wireless network to combat fading in wireless channel using multi-carrier wireless network. It also uses this paper to improve risk of error in multi-user with a wireless network with pre-coding. Wireless network includes several multiple...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A Modified VIKOR Method for Network Selection in Heterogeneous Networks

    Network selection is major issue for vertical handover decision in heterogeneous networks. With the emerging mix of beyond 3G or fourth generation wireless technology it is difficult for one service provide to provide ubiquitous access to every user. Further every network offers variety of services to the user in one...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Congestion Prevention Technique for Miscellaneous Traffic Network

    The increase in various types of applications such as interactive, multimedia, voice, or data on portable devices leads to a miscellaneous traffic load in network. The availability of different network generations and ad-hoc networks also give birth to a miscellaneous traffic in the network. The bandwidth requirement of such type...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Search and Update Based Solutions to Locate Mobile Agents in the Global Network

    Mobile agent location monitoring is an important mechanism in highly dynamic and large-scale networks to control and communicate with agents after launching. Different applications require different level of interaction with mobile agent after launching. This paper presents the idea of Location Policy Manager (LPM), a component of mobile agent system...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Location Management Cost in GSM

    To handle call delivery for mobile station, it's probable location should be known to the network. For that location management is required. Location management has two basic operations: location update and paging. The goal of an efficient location management scheme is to maintain and provide locations of mobile stations at...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Synthesis of Protocol Converters Using the Timed Petri Net Model for Opportunistic Network

    Non homogeneous opportunistic network needs a protocol converter for reliable and efficient communication. Most protocol converters are designed based on the Communicating Finite State Machine (CFSM) as the formal description technique to describe the protocols, their services and converter design. The main drawbacks of CFSM model are state explosion problem...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A New Algorithm to Combat Multiple Attacks in Wireless Adhoc Networks

    Ad hoc network is a multi-hop wireless network independently of any base station or fixed infrastructure. In ad hoc network, all networking functions must be performed by the nodes themselves. Thus each node acts not only as a terminal but also a router. The routers are free to move randomly...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Optimisation Techniques for Packet Forwarding Through Power Heterogeneous Manets

    A Mobile Ad hoc NETwork (MANET) is a self configuring infrastructure less network of mobile devices connected by wireless. Power heterogeneity is common in mobile ad hoc networks. By using high power nodes mobile ad-hoc network can improve network broadcasting robustness, scalability and connectivity. The high power nodes are severely...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    A Dynamic Session Key Generation Method to Secure Data Routing in Heterogeneous Sensor Networks

    In recent era, Wireless Sensor Networks (WSNs) are playing a vital role in communication world. WSNs are placed in hostile environments where many critical aspects are to be considered-energy efficiency, robustness, performance and lifetime of the network. WSNs with homogeneous sensors will not attain a great performance due to their...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Event-Driven Data Dissemination in VANET Using ADEM Algorithm

    VANET integrates components of Wi-Fi, Blue-tooth and other mobile connectivity protocols to facilitate data transfer between cars and roadside equipment and automobile traffic. Immediate benefits of VANETs are preventing accidents and avoiding traffic jam. If a car spots a dangerous road situation, such as an accident, it transmits the information...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Delay Reduction by Using Shortest Path for Critical Event in WSN

    In Wireless Sensor Network (WSN), for critical event only less number of packets is transmitted. But for critical event more number of packets wants to be transmitting. So, sleep scheduling method used to increase the network lifetime. When critical event occurs, an alarm message is quickly transmitted to centre node....

    Provided By International forum of researchers Students and Academician