International forum of researchers Students and Academician

Displaying 1-40 of 388 results

  • White Papers // Jun 2014

    Implementation of Energy Efficient Adaptive MAC Protocol for Wireless Sensor Network

    Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, low sensing ranges result in dense networks and thus it becomes necessary to achieve an efficient medium-access protocol...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Implementation of BCD to Seven Segment Display Decoder Using SIMULINK Model

    Displaying of information in public places like banks, offices, airports etc. is a very important issue now-a-day. Numbers and alphabets can be displayed by using devices that use LEDs and LCDs. The internal circuits normally works with binary and ASCII codes which only uses two symbols, zero and one. Displaying...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Development of Mote for WSNs

    In this paper, the authors present design and development of mote for Wireless Sensor Network (WSN). The node is equipped with sensors to sense the temperature and humidity of the environment. An embedded wireless sensor node has been developed by using AVR Atmel AT89S52 microcontroller and Zigbee transceiver as wireless...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Implementation of 8-Bit Multiplier in Verilog Using Reversible Logic Gates

    Reversible logic gates are very much in demand for the future computing technologies as they are known to produce zero power dissipation under ideal conditions. A digital combinational logic circuit is reversible if it maps each input pattern to a unique output pattern. Such circuits are of interest in quantum...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Credit Card Fraud Detection Using Amend K-Means

    Today, internet has become the essential component of life. As telephone, fridge it becomes the important feature. Now-a-days, people don't have much time and they wish to do shopping sitting at home. Credit card is purchase now and pays later. As credit card has the power to purchase the things,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Prediction of Student Academic Performance Using Clustering

    One of the significant facts in higher learning institution is the explosive growth of educational data. These data are increasing rapidly without any benefit to the management. The main objective of any higher educational institution is to improve the quality of managerial decisions and to impart quality education. Predicting successful...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Automating the Process of Normalization

    Normalization is the most exercised technique for the analysis of relational databases. It aims at creating a set of relational tables with minimum data redundancy that preserve consistency and facilitate correct insertion, deletion, and modification. A normalized database does not show anomalies due to future updates. It is very much...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Pattern Taxonomy Model in Text Mining

    Text documents in the form of digital data are rapidly increasing. Manually analyzing such data is a tiresome task. Data mining techniques have been considered to analyze such data and generate interesting patterns. Many existing techniques use term-based methods. Some term-based approaches are Rocchio and probabilistic models, BM25, rough set...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    Enhancing the Accuracy of K-Means Clustering Algorithm by Mean-Based Initial Centroids

    In this paper, the authors reflect the comparative study of k-means clustering algorithm with the mean based initial centroids. The original k-means algorithm helps to calculate the distance between the data objects, but the difficulty is that the k-means algorithm is not efficient and accurate to calculate distance and henceforth...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2014

    A Novel Data Warehouse Architecture for Improvement in the Extraction,Cleaning and Loading of Optimized Data in a Data Warehouse

    Over the past decade, companies have spent billions of dollars on data marts and warehouses. From their experiences, a substantial body of knowledge has been created. Deciding the most suitable architecture is the most crucial activity in the data warehouse life cycle. Architecture is the key factor in setting up...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A New Approach of Data Mining for Preserving the Privacy Using Data Perturbation Techniques

    Privacy is a critical requirement in distributed data mining. Recently a new class of data mining methods known as Privacy Preserving Data Mining (PPDM) algorithms is introduced. The aim of these algorithms is the extraction of relevant knowledge from large amount of data, while protecting the sensitive information at the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Spam Detection Using Email Abstraction

    Now-a-days, communication has been increased enormously. Today's generation consider email as a fastest medium of communication within shorter duration and for longer distance. Spam is junk email or email which users do not want in their inbox. For finding out spam mails several methods exist. These methods are broadly classified...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    An Anonymization Method Based Data Publishing Using Tradeoff Function

    Important issue in data publishing is privacy preservation. Techniques such as generalization and suppression are used for data anonymization privacy protection; many algorithms for anonymization are available in meeting the privacy requirements of the privacy models such as k-anonymity, l-diversity and t-closeness. Important consideration is tradeoff between privacy and utility....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Implementation of Clustering Algorithms in RapidMiner

    Clustering can be used for data mining, information retrieval, text mining, web analysis and marketing etc. There are various Clustering algorithms but the authors have implemented three algorithms (K-means, DBScan and K-medoids) in RapidMiner. In data mining, Clustering can be considered as the most unsupervised learning techniques. Clustering is a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A Web Documents Clustering System Using Concept Based Mining

    Existing text mining techniques captures the importance of a term (word or phrase) using term frequency at document level only. The text mining techniques should capture the meaning or semantics of a text also. In this paper, a new concept-based mining system is introduced which analyzes the terms on sentence,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Preferences Extraction and Ranking and Functions in Mobile Search

    Mobile device interaction with users serves various purposes such as location service, road map, traffic information etc. It also helps user connect to the search engines. But the search query is limited to small words unlike those used when interacting with search engines through computers. This leads to drawback in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Hybrid Artificial Bee Colony Algorithm: A New Swarm Intelligence Approach for Data Clustering

    Clustering is a commonly encountered problem which must be solved in various fields of science and engineering. Recently, some approaches based on swarm intelligence were proposed for data clustering. Swarm intelligence is a computational intelligence technique to crack complex real-world problems. It is stimulated by intelligent behaviors of insect or...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    To Implement Distributed Data Mining to Make Intelligent Mobile Agent

    An agent is essentially a special software component that has autonomy that provides an interoperable interface to an arbitrary system and/or behaves like a human agent, working for some clients in pursuit of its own agenda. The paper focuses on mechanism of intelligent mobile agent architecture for the application domain...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Efficient Data Retrival Over Cloud

    As cloud computing become more flexible & effective in terms of economy, data owners are motivated to outsource their complex data systems from local sites to commercial public cloud. But for security of data, sensitive data has to be encrypted before outsourcing, which overcomes method of traditional data utilization based...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Home automation System Using Cloud Computing and Mobile Devices

    Home automation, as a model of pervasive computing, is progressively becoming substantial for people homed in developed societies. With the proliferation in the usage of household electronic and electrical appliances, numerous data and multifarious control-slevycumbersome burden on residential home automation control units, making it expensive and difficult for the users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Comparative Study of FPGA Based Systems

    In this paper, the authors review the Field Programmable Gate Array (FPGA) with the focus on FPGA-based systems. The over view of FPGA and FPG A programming is represented in the literature. FPGA-based neural networks are provided in order to highlight the best advantage by using FPGA with this type...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Embedded System for Earthquake Victims

    The unprecedented scale and number of natural and man-made disasters in the past decade has urged International emergency search and rescue communities to seek for novel technology to enhance operation efficiency. Embedded search and rescue system that can navigate into material to search for victims and transfer critical field data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    An Efficient Test Vector Compression Scheme for SoC Design

    Memory is one of the most restricted resources in the embedded system design. Larger test data size in System-on-Chip (SoC) demands not only higher memory requirements, but also an increase in testing time. Code compression techniques have been used to address this issue by reducing the code size of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Microcontroller Based Speed Control of DC Motor Through RS 232 Interface with PC

    Role of electrical drives is a major concern in industrial automation. Industrial applications use dc motors because the speed-torque relationship can be varied to almost any useful form for both dc motor and regeneration applications in either direction of rotation. DC motors are often applied where they momentarily deliver three...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Large Data Reconfiguration Using Byzantine Fault Technique

    In this paper, the authors describe a knowledge large data storage that exploits local data versioning within each storage-node. With Byzantine failures technique of clients and server. The storage nodes work to client and high optimistic operations. This can be problematic in long-lived, large-scale systems where system membership is likely...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Algorithms for Anonymization Principles to Achieve Better Privacy in Data Publication

    ANGEL, a technique used for data publication. It publishes the original data in the form of BT (Batch Table) and GT (Generalized Table). This Technique uses anonymization principles such as k-anonymity and l-diversity. This paper also uses an advanced anonymization principle called t-closeness for smaller data sets and (n, t)-closeness...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Improving Maximal Frequent Itemset Mining for Sparse Dataset

    Mining of maximal frequent patterns is a basic problem in data mining applications. Small and useful association rules can be generated from maximal frequent itemset. The algorithms which are used to generate the maximal frequent patterns must perform efficiently. Most of the existing algorithms passed all frequent itemsets as candidates...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Study on Collaborative Web Mining Approaches

    Internet has become main source of information. With the popularization of computers and internet, even the common people find it useful to satisfy even their minute day-to-day information needs. At the same time it is an encyclopedia of all knowledge domains and an efficient medium of information sharing. However, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Study and Analysis of Active Data Warehousing and its Implementation in Sun Oracle Data Base

    Business Intelligence (BI) is becoming an important part of more organizations' day-to-day operations, and active data warehousing is a prime enabling technology. As with many good business technologies, the concept of active data warehousing was born from user requirements rather than from vendors' technological ability. With active data warehousing, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Hierarchical Bisecting Clustering with Multi View-Point Based Similarity Measure

    Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation and browsing mechanisms. There are some clustering methods which have to assume some cluster relationship among the data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Rough Set Based Privacy Preserving Attribute Reduction on Vertically Partitioned Data and Generation of Rules

    Data mining is the process of extracting knowledge from various databases. For security reasons organizations may partition their data horizontally or vertically. Another situation is hospitals maintaining sensitive information about patients. This paper can also be treated as vertical partitioning of data if all the hospitals maintain data in the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Streaming Data Ware Houses Modernization Under the Process of Scalable Scheduling

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Review on Mitigating Data Theft Attacks in the Fog Computing

    The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively scalable, efficient, agile, reliable and secure. The telecommunications networks have for many years, Demonstrated their ability to reliably enable network (voice) services creation, assurance...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Large Scale Reliable Storage Systems

    The available fault-tolerant storage systems either assume a static set of replicas, or have limitations in how they handle reconfigurations. This can be problematic in large-scale systems where system membership is likely to change during the system lifetime. In this paper, the authors present a better solution for dynamically changing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Survey of Algorithms for Sentence Extraction & Text Summarization

    World is observing an explosion of unstructured data today, a significant part of it, is in text form. One of the most effective text analytics techniques is extraction of keywords. Keywords provide information to obtain the summary of a document and they help in correlating documents. The main challenge is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Data Mining Application in Telecommunication: Fraud Detection

    Data mining is used in many areas to extract useful information from the cluster of data. There are different steps included in data mining process which are stated as follows: gathering data, selecting an algorithm, regression. By following these steps one can extract the useful information from the heap of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Ontology Model for Ranking Techniques by Quality Reference for Domain-Specific Search

    Data mining is used to extract valid, previously unknown, and easily interpretable information from large data sets. As a model for knowledge description and formalization, ontology's are widely used to represent ranking techniques in personalized information gathering for the domain specific search. However, when representing Ranking Information, many models have...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Developing Method for Mining of Knowledge For Customer Relationship Management

    Data mining is process of extracting or mining of knowledge from huge quantity of data Modern companies and organizations are efficiently implementing a CRM strategy for managing a company interactions and relationships with customers. CRM systems have been developed and designed to support the areas of marketing, service process and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    An Implementation on 8x8 Vedic Multiplier Using Vedic Mathematics with High Speed Performance

    A high speed processor depends greatly on the multiplier as it is one of the key hardware blocks in most Digital Signal Processing (DSP) systems as well as in general processors. This paper presents a high speed 8x8 bit Vedic multiplier architecture which is quite different from the conventional method...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing Using Effective TPA

    Cloud computing is an internet based computing which enables sharing of services. Many users place their data in the cloud, so correctness of data and security is a prime concern. This paper studies the problem of ensuring the integrity and security of data storage in cloud computing. Security in cloud...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Prioritizing Quality Requirements Based on Software Architecture Evaluation Feedback

    Quality attributes such as performance, reliability, and maintainability, are crucial for the success of any software system. The software architecture largely influences the quality properties a software system will exhibit. However, while quality requirements are defined in many companies mainly upfront, they are not systematically incorporated during development and thus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Extended SNMP Agent for Network Device Management

    The SNMP (Simple Network Management Protocol) provides a method of managing network hosts such as workstation or server computers, routers, bridges and hubs from a centrally-located computer running network management software. SNMP performs management services by using a distributed architecture of management system and agent. The SNMP agents which are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Consistent Data Access: An Effective Data Replication at Last Mile Services

    The up-coming last-mile services architecture assures to get the better ease of use and presentation of web services by making the servers available by distributing distributed globally. The main confront in such systems is data duplication and uniformity by which Last-Mile server code can control mutual data without deserving the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Protecting Privacy by Location Aggregation in Wireless Sensor Networks

    Preserving privacy of an individual while accessing location based information from Location Based Services (LBSs) is one of the most challenging tasks as the user unknowingly reveals the personal location in this process, where the location information can be tracked continuously and can be exploited. Sometimes it is required that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Importance and Benefits of Proposed ERP Maintenance Model

    Enterprise Resource Planning (ERP) systems are identified as enterprise wide software to integrate all the business processes for organizations. Enterprise Resource Planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Still Many organizations lack experience and expertise in managing ERP maintenance and upgrade effectively. One of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey on Privacy Preserving Data Mining

    The increasing use of data mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual's need and right to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Digital P2P Reputation System Using Self Certified Cryptographic Exchanges

    The main reason behind the success Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems is not a feasible solution for P2P networks to store peer reputation information. Though a centralized system does exist, it...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Analysis of a Hybrid Cipher Algorithm for Data Encryption

    Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Wireless Sensor Network & Security Attack Analysis

    The materialization of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning separately, and in many cases, without access to renewable energy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    The Ten Ingredients of Data Base Systems for Improving Performance and Their Review Leading to Research Problems

    In this paper, the authors survey, consolidate, and present the state of the art in database system and they try to specify the most important research possibilities in the data bases. The heart of their analysis is a survey on basic to advanced concepts and their relativity which will give...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Maintenance Management to Improve Productivity

    The role of maintenance is very important in the successful operations of continuous process plants like power, chemicals and fertilizer plants. Maintenance is a line function and it is based on systems developed to cover day to day breakdown maintenance, planned maintenance, preventive and predictive maintenance. Computers are integral part...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Performance Analysis on Channel Assignment Scheme in Mobile Networks

    This paper presents a general framework for a wide range of Call Admission Control (CAC) algorithms. For several CAC schemes, which are a subset of this general framework, an analytical performance evaluation is presented for a mobile wireless network. These CAC algorithms consider a variety of mechanisms to prioritize traffic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Increase Sensor Network Tenure by Captive Genetic Algorithm Method

    In sensor networks the nodes have limited energy, so it is critical to the save the energy of the nodes and thus the overall energy consumption of the network. This is necessary to increase the tenure of the entire network. In this paper the genetic algorithm and simulated annealing algorithms...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Fault Tolerance and Retrieval in MPLS Network

    Multi Protocol Label Switching (MPLS) is an evolving network technology that has been used to provide Traffic Engineering and high speed networking. Uninterrupted transmission in case of failure is a major concern in MPLS based networks. The path protection is an effective method for uninterrupted transmission. Existing approaches towards the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Review of Mobile Grid Computing and Its Architecture Classification

    The concepts of grid computing and mobile computing are the emerging trends in computer science and the advances are going in this filed hand in hand. The paper here discusses how the grid computing can be implemented in wireless mobile devices to work it as a single concept of mobile...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Call Admission Control Scheme in Wireless Mobile Network

    An important issue in the operation of a cellular telephone system is how to efficiently use the available band width to provide good service to as many customers as for civil. This application demand and allocation could lead to congestion if the network has to maintain such high resources for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Proposed Cryptographic Algorithm Provides Better Data Security

    RSA algorithm uses integer factorization as the backbone of data security while Diffie-Hellman Algorithm uses Discrete Logarithm to provide platform for secure key exchange. In this paper, the authors provide algorithm to merge both of them to provide a user with even higher level of data security. Actually, their intent...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Mobile Payment System-A Secure Approach

    This paper is to design a complete architecture and model of SMS-based mobile payment system, which could be used to implement a wireless platform for transferring money from one person to other person, paying utility bills and etc. Mobile communication devices have become popular tools for gathering and disseminating information...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Polling Algorithm for Dynamic Bandwidth Distribution in LR-PON

    With the advances in optical technology, long-reach PON increased the span of a broadband access network using PON technology from today's standard of 20 km to 100 km or higher. This technology can enable broadband access for a large number of customers in the access/metro area. In LR-PON the propagation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Two Layer Intrusion Detection System for Mobile Devices

    In recent years, the usage of mobile devices has increased like anything. Mobile devices are more used for gaming, video streams, transferring files, connecting to internet rather than voice or text communication. At this point of time, a strong Intrusion Detection System (IDS) for mobile devices is must. Even though...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Automated Generation of Test Data for Evolutionary Testing With Empirical Study Using AspectJ Programs

    In today's programming paradigm research interest is moving from object oriented programming to Aspect oriented programming. Most of the research on aspect oriented programs was targeted towards the programming, not for testing. Automation of AOP testing is a new research area and very few researchers are working on automation of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Exploring Smart, Efficient and Robust Routing Algorithm for VANET

    This paper gives the insight of VANET and the new techniques by which the performance of VANET can be improved. There by making the VANET more intelligent smart and robust. Here the hybrid techniques are used to measure the various parameters of VANET. VANET is an emerging technology to achieve...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    The MPEG-7 Standard

    MPEG-7, formally known as Multimedia Content Description Interface, includes standardized tools (descriptors, description schemes, and language) enabling structural, detailed descriptions of audio - visual information at different granularity levels (region, image, video segment, collection) and in different areas (content description, management, organization, navigation, and user interaction). It uses XML to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Learning OO Concepts Through Storytelling Metaphors and 3D Objects Using Alice

    Teaching programming to a novice is equally challenging to both the learner and the teacher. Several attempts have been made in the past to ease out the pain of the learner and to assist them in enhancing their learning outcomes. This paper includes providing specially designed languages to teach programming,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Approach for Optimization of the Performance of DSR (Distance Source Routing) in Mobile Ad-Hoc Network as Optimized-DSR

    Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless network. Due to absence of any fixed node, each node acts as a router, providing routing capability for the MANET. Various protocols for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Dual Module Secure Login (DMSL)

    DMSL is an enhanced technique used as a counter measure for the shoulder surfing attack. It is more secure technique than the previous versions. Shoulder surfing is an observation technique of stealing the information by looking over someone's shoulder. Very often people are unaware of the presence of any external...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Performance Evaluation of Elliptic Curve Cryptosystem and Its Application

    ECC is a public key cryptosystem similar to RSA but it is based on elliptic curves. ECC are described with setting of the multiplicative group5 of the integers modulo a prime p. Such system can be modified to work in the group of points on an elliptic curve6. Further Diffe-Hellman...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Comparison of Propagation Path Loss Models in Outdoor Environment at 900MHz

    Wireless system has been active area of research in recent times. Generally Path loss models are used for predicting the losses in environment depending upon the different types of terrain. These models provide the different result in different area. In this paper, the authors compare different path loss models by...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Design and Development of Error Tracking and Debugging Tool in Android Platform

    Test automation in various mobile platforms is becoming a need. There are currently available tools in the market that cater to support mobile phone, web and desktop applications on various platforms. These tools are available at a cost by prominent vendors in the industry. The aim of this paper is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Optimized and Energy Efficient Multicast Routing Algorithm for Wireless Mobile Ad Hoc Networks Using Genetic Algorithm Approach

    In ad hoc networks, mobile node battery energy is finite and represents one of the greatest constraints for designing multicast routing protocols. In regards to the battery lifetime limitation in supporting multicast routing, some studies have investigated a power saving network layer. These proposed methods have always considered several techniques...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Comparability of PTS & SLM PAPR Reduction Techniques in MIMO-OFDM System

    This paper enhances SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) which are known as PAPR reduction methods for OFDM. And comparison of both PTS and SLM technique discussed. Multicarrier systems suffer from a high Peak-to-Average power Ratio (PAR) of their transmit signal as large signal peaks lead to power...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Modified Approach to Multipath Routing Protocols in Mobile Adhoc Networks

    Mobile ad hoc networks are typically characterized by high mobility and frequent link failures. As a result, routing algorithms selecting a single path during route creation have to make frequent route discoveries resulting in decreased throughput and high end-to-end delay. Multipath routing approaches like DSR make use of pre-computed routes...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Performance Analysis of FTTH Gigabit Ethernet Passive Optical Network (GEPON) System With Triple Play Services

    In the paper performance of the FTTH Gigabit Ethernet Passive Optical Network (GEPON) system with triple play services such as video broadcast at 1550 nm and voice over IP and high speed internet at 1490 nm with 1:32 splitting is evaluated using FEC technique. By using the FEC (Forward Error...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Advanced Modeling of Packet Switched Network in WAP

    Computer networks form an essential substrate for the multitude of distributed application which is now an essential part of modern business and personal life. It is important to optimize the performance of computer networks, so that users can derive optimum utility from the expertise in network infrastructure. Most networks perform...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Dynamic Address Management in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A number of mobile devices may connect together to form one network. Address auto-configuration is an important issue for ad hoc networks in order to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Multiparty Computation Using Homomorphic Encryption

    Secure multiparty computation has become most popular research now days. Multiple parties want to perform a function with the data possessed by each party without disclosing the data to each other and without the involvement of a trusted third party. This paper deals with the computation of sum of n...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Exploration of Three Dimensional Codes Based on Model A and Model B Using Algebraic Congruent Operator in OCDMA System

    Algebraic congruent codes utilizes congruent operators within the Galois field to obtain the address sequences of different users for OCDMA system. With same or different operators, different sequences could be generated based on model A and model B, such as prime sequences, quadratic congruent sequences, hyperbolic congruent sequences, and cubic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Security in Wireless Sensor Network With Broadcast

    Wireless Sensor Networks (WSN) is an emerging technology and day-by-day it is attracting the attention of researchers with its challenging characteristics. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN. Security...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    HALARM: Heterogeneous Alarm to Withstand DOS Attacks

    Data mining based information processing in MANET is at its entering stage, as compared to traditional machine learning and MANET. Currently, researches mainly focus on applying machine learning techniques to solve a particular problem in MANET. Different researchers will have different assumptions, application scenarios and preferences in applying machine learning...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Biased and Secured Time Synchronized Protocol for Wireless Sensor Networks

    In a wireless sensor network a large number of sensors are deployed for the purpose of sensing and bring the data back securely to nearby base stations. The base stations then perform the costly computation on behalf of the sensors to analyze the data sensed by the sensors. Due to...

    Provided By International forum of researchers Students and Academician