International forum of researchers Students and Academician

Displaying 1-40 of 540 results

  • White Papers // Nov 2014

    Sybil Attack Detection in MANET

    In this paper, the authors propose a scheme to detect the mobile identities of Sybil attackers in urban or congested areas. Fully self-organized Mobile Ad hoc NETworks (MANETs) represent complex distributed systems. Due to the complex nature of MANETs and its resource constraint nodes, there has always been a need...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Grid Topology Based Performance Analysis of TCP Variants with Routing Protocol

    TCP is being used as a highly reliable end-to-end protocol for transporting applications. TCP was originally designed for wired links where the error rate is really low and actually assumed that packet losses are due to congestion in the network. But TCP performance in wireless networks suffers from significant throughput...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Different Approaches to Construct Collaborative Environment and Real Time Collaborative Editing

    A collaborative system is one where multiple users or agents engage in a shared activity, usually from remote locations. In the larger family of distributed applications, collaborative systems are distinguished by the fact that the agents in the system are working together towards a common goal and have a critical...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Reconfigurable Efficient Design of BCH Encoder for Communication Systems

    In this paper, the authors propose a design and FPGA implementation of SISO BCH encoder. FPGA's are reprogrammable and they require shorter testing and debugging times, thus making them increasingly popular for rapid hardware prototyping. Reconfigurable systems also offer the potential of accelerating or speeding up the algorithms to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Blackhole Attack Putting into Practice in AODV Routing Protocol

    An ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. Because of security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    Classification of TCP Variants Inside Wireless Networks

    TCP is transmission control protocol in TCP/IP protocol suite which provides end to end, connection-oriented and reliable packet delivery services in computer network. TCP provides services to both wired and wireless networks. The performance of TCP in wired network is optimized. While in wireless network the nodes are dynamic in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2014

    A Review of Data Structures Used in Finding Frequent Itemsets Quickly

    In databases or data warehouse records the relevance between interesting mutual relationships amongst the attributes has gained a lot of focus now-a-days. The main research in this area is the Mining of association rules. To mine the association rules, it is important to generate the frequent itemsets. The efficiency of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Review Study of Behavioural Biometric Techniques for User Authentication

    Most of the existing authentication system has certain drawbacks for that reason graphical passwords are more suitable authentication system where users click on images to authenticate themselves. A necessary usable goal of an authentication system is to support users for selecting the better password. User creates unforgettable password which is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Two Phase Watermarking for Security in Database

    Digital multimedia watermarking technology had suggested in the last decade to embed copyright information in digital objects such as images, audio and video. However, the increasing use of relational database systems in many real-life applications created an ever-increasing need for watermarking database systems. As a result, watermarking relational database systems...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Developing a Teaching Methodology in the Time of Life of Cloud Computing

    The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Temporal Association Rule Mining in Soft Computing Framework: A Survey

    In this paper, the authors provide a survey of association rule mining in soft computing framework especially in fuzzy genetic paradigm based on temporal behavior of the transactions. Soft computing tools and its hybridization provides a great potential to come up with rules with greater confidence value than the apriori...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2014

    Implementation and Analysis of WiMAX Module for Reactive and Proactive Routing Protocols under ns2

    Today the world is moving towards wireless system. Wireless networks are gaining popularity to its peak today, as the users want wireless connectivity irrespective of their geographic position WiMAX are considered to be the special application of infrastructure-less wireless Mobile Ad-hoc NETwork (MANET). In these networks, the speed of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Sep 2014

    Temperature Sensing based on Industrial automation by using Zigbee and Infrared

    Any object will produce infrared radiation when its temperature is above absolute zero. The intensity of the infrared radiant energy emitted by the object and its temperature is proportional. The temperature of the object is stronger than the energy of the infrared radiation emitted. In the industrial field, long running...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Hierarchical Clustering Approach to Reduce Message Collision in Wireless Mesh Network

    Wireless Mesh Networks (WMNs) is part of ad-hoc network. WMNs are undergoing rapid progress and inspiring numerous applications. In this paper, the authors are working on path selection protocol of WMNs. The path selection protocol has various issues like power consumption, congestion control, and load balance and message collision. Here,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Security and Quality of Service Improvement In Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a group of sensors that are geographically distributed and interconnected by wireless networks. There exists a tradeoff in the form of security issues such as data integrity, confidentiality, and freshness in data aggregation that increase manifold when the WSN is deployed in a remote...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Routing Metrics and Global Load Balancing Mechanism In Wireless Sensor Networks

    Wireless sensor networks have received increasing attention in the recent few years. In many military and civil applications of sensor networks, sensors are constrained in onboard energy supply and are left unattended. Wireless Sensor Networks (WSNs) require appropriate protocols that make judicious use of the finite energy resources of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Evaluation of Dynamic Routing Protocols with Packet Tracer: RIP and EIGRP

    In this paper, performance analysis of the wired computer networks for combination of conventional model of RIP and EIGRP is evaluated through simulation which has been attempted using packet tracer as simulating tool. The Routing Information Protocol (RIP) is one of the first widely used routing protocols. RIP takes the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Comparative Study of Different PAPR Reduction Techniques of OFDM

    Orthogonal Frequency Division Multiplexing (OFDM) is considered to be a promising technique against the multipath fading channel for wireless communications. However, the main drawback of OFDM system is the high Peak to Average Power Ratio (PAPR) of the transmitted signals system which leads to power inefficiency in RF section of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Implementation and Performance Analysis of Mobile Cloud Computing Based on Java and Cloud Analyst

    Cloud computing is recognized as a revolution in the computing area. As predicted by the researcher, mobile phones will overtake PCs as the most common web access devices worldwide by 2013. Due to the increase of mobile network infrastructures, they are becoming popular clients to use web resources and especially...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Study on Adaptive Position Update for Geographic Routing in Manets

    In geographic routing, nodes need to maintain up-to-date positions of their immediate neighbors for making effective forwarding decisions. Periodic broadcasting of beacon packets that contain the geographic location of the nodes is a popular method used by most geographic routing protocols to maintain neighbor positions. A node transmits its next...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    An Effective Approach to Improvise the Lifetime of Network by almost Delaunay Triangulation

    Wireless Sensor Networks (WSNs) gained its limelight because of the usage of low-cost and communicable intelligent sensors. When the nodes begin to communicate with each other, obviously the energy level drops out, since the battery backup is limited. This is a critical issue needs to be handled. The authors propose...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Survey of Mobile Cloud Computing (MCC): Applications and Security Issues

    Even though increasing usage of mobile computing, misusing its full potential is difficult due to its essential problems such as insufficiency of resources, regular interruptions, and mobility. Mobile cloud computing can address these problems by executing mobile applications on resource providers outside to the mobile device, Together with an explosive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Accessing Cloud Storage by Group Members with Secure Dynamic User Registration and Revocation

    Cloud computing is one of the computing concepts that involves a large number of computers connected through a real-time communication network such as the Internet. Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared pool of configurable computing storage,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    Impact of Data Mining Technology in E-Commerce Environment

    Internet has grown so vast these days and brought so many opportunities in the field of business and has become the cause of development of enterprises. Web information mining has become vital in the status of e-commerce websites. The data mining helps in deciding the development factor of the organizations....

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2014

    A Novel Secure Watermarking Scheme for RDBMS

    Database watermarking is to generate robust and persistent watermark for database. Watermarking for relational databases emerged as a vital solution to provide copyright protection, tamper detection and to maintain the integrity of data. An important area such as payroll, inventory, students' marks, defense and finance requires reliable scheme for checking...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Content Sharing over Smartphone Based on Delay Tolerant Networks

    Delay tolerant network is evolving class of wireless ad hoc network that may or may not have infrastructure. In years DTN has found application in sensor network for monitoring ecological environment, people net, ocean sensor network, vehicle network, military ad hoc network, disaster recovery networks, rural communication network etc. DTN...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Cloud Computing and Information Security: Is Compromise Inevitable?

    Today, generally many largest software companies operate almost entirely in the cloud. Despite well established business and technical advantages of cloud computing, many potential cloud users have yet to join the cloud, and those major corporations that are cloud users are for the most part putting only their less sensitive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    An Optimal Caching Mechanism to Reduce Content Provisioning Cost in Social Wireless Networks

    Social Wireless Networks (SWNs) are getting more popular in today's working environment. This new concept increased the rate of data sharing. This paper introduces an optimal caching mechanism to reduce the network traffic and the downloading cost of data in Social Wireless Networks (SWNs). This is based on a cooperative...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Data Mining in Cloud Storages

    The cloud computing is a rapid growing technology. It is growing at an annual rate of 36% and is estimated to have a market size of 19.5 Billion $ by the year 2016. The storage of data is moving from personal hard disks to the cloud, where the amount of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    A Review and Analysis on Agile Scrum Process

    Over a last decade several scientific and popular publications show that the use of agile methods is growing in a rapid manner among organizations which working in software development. The agile methodologies were introduced to meet the new requirements of the software development companies. The agile methodologies aim at facilitating...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Secured Mobility Controlled Java-Centric Architecture for Industrial Systems

    Java mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent helps the Java Mobile Agent (JMA) to travel in open network. The Java mobile agent platform is the most trusted environment for Java mobile agent which provides the computational environment for Java...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Hiding Images and Video inside Video using Message Dependent Key Based Encryption and Entropy Based Hiding

    Data hiding method for videos with high security and maximum payload utilization is proposed. The method hides video clip and/or multiple images inside a high resolution video. Before hidden message data is encrypted using a unique algorithm that uses the help of message itself to generate the key for encryption....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Distributed Multi-Path Finding Algorithm For Energy Efficient Distributed Routing Scheme

    Energy inefficiencies in current networks provide both challenges and opportunities for energy saving. Recently, here are many works focusing on minimizing energy cost from the routing perspective. However, most existing paper views them as optimization problems and solves them in a centralized manner such as with a solver or using...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Adaptive Mobile Video Streaming and Sharing in the Clouds

    While demands on video traffic over mobile networks have been souring, the wireless link capacity cannot keep up with the traffic demand. The gap between the traffic demand and the link capacity, along with time-varying link conditions, results in poor service quality of video streaming over mobile networks such as...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    Cloud Computing: Appraisal Study

    Now-a-days, cloud computing has emerged as a new technological model in the pasture of information technology and business with everything as a services. Cloud computing provides all types of services over the internet with pay-per-used choice and provides time and cost efficient business solution. Actually the cloud computing is emerged...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2014

    DRM Architecture to Distribute and Protect Multimedia Contents

    In this paper, the authors propose architecture for distributing and managing digital contents, combining traditional access control and Digital Rights Management (DRM) aspects, which executes the content usage control. The architecture defines security policies to establish access rights to protected content and to establish licenses to control the use of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Implementation of Energy Efficient Adaptive MAC Protocol for Wireless Sensor Network

    Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, low sensing ranges result in dense networks and thus it becomes necessary to achieve an efficient medium-access protocol...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Implementation of BCD to Seven Segment Display Decoder Using SIMULINK Model

    Displaying of information in public places like banks, offices, airports etc. is a very important issue now-a-day. Numbers and alphabets can be displayed by using devices that use LEDs and LCDs. The internal circuits normally works with binary and ASCII codes which only uses two symbols, zero and one. Displaying...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Implementation of 8-Bit Multiplier in Verilog Using Reversible Logic Gates

    Reversible logic gates are very much in demand for the future computing technologies as they are known to produce zero power dissipation under ideal conditions. A digital combinational logic circuit is reversible if it maps each input pattern to a unique output pattern. Such circuits are of interest in quantum...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2014

    Design and Development of Mote for WSNs

    In this paper, the authors present design and development of mote for Wireless Sensor Network (WSN). The node is equipped with sensors to sense the temperature and humidity of the environment. An embedded wireless sensor node has been developed by using AVR Atmel AT89S52 microcontroller and Zigbee transceiver as wireless...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Prioritizing Quality Requirements Based on Software Architecture Evaluation Feedback

    Quality attributes such as performance, reliability, and maintainability, are crucial for the success of any software system. The software architecture largely influences the quality properties a software system will exhibit. However, while quality requirements are defined in many companies mainly upfront, they are not systematically incorporated during development and thus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Extended SNMP Agent for Network Device Management

    The SNMP (Simple Network Management Protocol) provides a method of managing network hosts such as workstation or server computers, routers, bridges and hubs from a centrally-located computer running network management software. SNMP performs management services by using a distributed architecture of management system and agent. The SNMP agents which are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Consistent Data Access: An Effective Data Replication at Last Mile Services

    The up-coming last-mile services architecture assures to get the better ease of use and presentation of web services by making the servers available by distributing distributed globally. The main confront in such systems is data duplication and uniformity by which Last-Mile server code can control mutual data without deserving the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Protecting Privacy by Location Aggregation in Wireless Sensor Networks

    Preserving privacy of an individual while accessing location based information from Location Based Services (LBSs) is one of the most challenging tasks as the user unknowingly reveals the personal location in this process, where the location information can be tracked continuously and can be exploited. Sometimes it is required that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Importance and Benefits of Proposed ERP Maintenance Model

    Enterprise Resource Planning (ERP) systems are identified as enterprise wide software to integrate all the business processes for organizations. Enterprise Resource Planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Still Many organizations lack experience and expertise in managing ERP maintenance and upgrade effectively. One of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey on Privacy Preserving Data Mining

    The increasing use of data mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual's need and right to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Digital P2P Reputation System Using Self Certified Cryptographic Exchanges

    The main reason behind the success Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems is not a feasible solution for P2P networks to store peer reputation information. Though a centralized system does exist, it...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Analysis of a Hybrid Cipher Algorithm for Data Encryption

    Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Wireless Sensor Network & Security Attack Analysis

    The materialization of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning separately, and in many cases, without access to renewable energy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    The Ten Ingredients of Data Base Systems for Improving Performance and Their Review Leading to Research Problems

    In this paper, the authors survey, consolidate, and present the state of the art in database system and they try to specify the most important research possibilities in the data bases. The heart of their analysis is a survey on basic to advanced concepts and their relativity which will give...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Maintenance Management to Improve Productivity

    The role of maintenance is very important in the successful operations of continuous process plants like power, chemicals and fertilizer plants. Maintenance is a line function and it is based on systems developed to cover day to day breakdown maintenance, planned maintenance, preventive and predictive maintenance. Computers are integral part...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Performance Analysis on Channel Assignment Scheme in Mobile Networks

    This paper presents a general framework for a wide range of Call Admission Control (CAC) algorithms. For several CAC schemes, which are a subset of this general framework, an analytical performance evaluation is presented for a mobile wireless network. These CAC algorithms consider a variety of mechanisms to prioritize traffic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Increase Sensor Network Tenure by Captive Genetic Algorithm Method

    In sensor networks the nodes have limited energy, so it is critical to the save the energy of the nodes and thus the overall energy consumption of the network. This is necessary to increase the tenure of the entire network. In this paper the genetic algorithm and simulated annealing algorithms...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Fault Tolerance and Retrieval in MPLS Network

    Multi Protocol Label Switching (MPLS) is an evolving network technology that has been used to provide Traffic Engineering and high speed networking. Uninterrupted transmission in case of failure is a major concern in MPLS based networks. The path protection is an effective method for uninterrupted transmission. Existing approaches towards the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Review of Mobile Grid Computing and Its Architecture Classification

    The concepts of grid computing and mobile computing are the emerging trends in computer science and the advances are going in this filed hand in hand. The paper here discusses how the grid computing can be implemented in wireless mobile devices to work it as a single concept of mobile...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Call Admission Control Scheme in Wireless Mobile Network

    An important issue in the operation of a cellular telephone system is how to efficiently use the available band width to provide good service to as many customers as for civil. This application demand and allocation could lead to congestion if the network has to maintain such high resources for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Proposed Cryptographic Algorithm Provides Better Data Security

    RSA algorithm uses integer factorization as the backbone of data security while Diffie-Hellman Algorithm uses Discrete Logarithm to provide platform for secure key exchange. In this paper, the authors provide algorithm to merge both of them to provide a user with even higher level of data security. Actually, their intent...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Mobile Payment System-A Secure Approach

    This paper is to design a complete architecture and model of SMS-based mobile payment system, which could be used to implement a wireless platform for transferring money from one person to other person, paying utility bills and etc. Mobile communication devices have become popular tools for gathering and disseminating information...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Polling Algorithm for Dynamic Bandwidth Distribution in LR-PON

    With the advances in optical technology, long-reach PON increased the span of a broadband access network using PON technology from today's standard of 20 km to 100 km or higher. This technology can enable broadband access for a large number of customers in the access/metro area. In LR-PON the propagation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Two Layer Intrusion Detection System for Mobile Devices

    In recent years, the usage of mobile devices has increased like anything. Mobile devices are more used for gaming, video streams, transferring files, connecting to internet rather than voice or text communication. At this point of time, a strong Intrusion Detection System (IDS) for mobile devices is must. Even though...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Automated Generation of Test Data for Evolutionary Testing With Empirical Study Using AspectJ Programs

    In today's programming paradigm research interest is moving from object oriented programming to Aspect oriented programming. Most of the research on aspect oriented programs was targeted towards the programming, not for testing. Automation of AOP testing is a new research area and very few researchers are working on automation of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Exploring Smart, Efficient and Robust Routing Algorithm for VANET

    This paper gives the insight of VANET and the new techniques by which the performance of VANET can be improved. There by making the VANET more intelligent smart and robust. Here the hybrid techniques are used to measure the various parameters of VANET. VANET is an emerging technology to achieve...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    The MPEG-7 Standard

    MPEG-7, formally known as Multimedia Content Description Interface, includes standardized tools (descriptors, description schemes, and language) enabling structural, detailed descriptions of audio - visual information at different granularity levels (region, image, video segment, collection) and in different areas (content description, management, organization, navigation, and user interaction). It uses XML to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Learning OO Concepts Through Storytelling Metaphors and 3D Objects Using Alice

    Teaching programming to a novice is equally challenging to both the learner and the teacher. Several attempts have been made in the past to ease out the pain of the learner and to assist them in enhancing their learning outcomes. This paper includes providing specially designed languages to teach programming,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Approach for Optimization of the Performance of DSR (Distance Source Routing) in Mobile Ad-Hoc Network as Optimized-DSR

    Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless network. Due to absence of any fixed node, each node acts as a router, providing routing capability for the MANET. Various protocols for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Dual Module Secure Login (DMSL)

    DMSL is an enhanced technique used as a counter measure for the shoulder surfing attack. It is more secure technique than the previous versions. Shoulder surfing is an observation technique of stealing the information by looking over someone's shoulder. Very often people are unaware of the presence of any external...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Performance Evaluation of Elliptic Curve Cryptosystem and Its Application

    ECC is a public key cryptosystem similar to RSA but it is based on elliptic curves. ECC are described with setting of the multiplicative group5 of the integers modulo a prime p. Such system can be modified to work in the group of points on an elliptic curve6. Further Diffe-Hellman...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Comparison of Propagation Path Loss Models in Outdoor Environment at 900MHz

    Wireless system has been active area of research in recent times. Generally Path loss models are used for predicting the losses in environment depending upon the different types of terrain. These models provide the different result in different area. In this paper, the authors compare different path loss models by...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Design and Development of Error Tracking and Debugging Tool in Android Platform

    Test automation in various mobile platforms is becoming a need. There are currently available tools in the market that cater to support mobile phone, web and desktop applications on various platforms. These tools are available at a cost by prominent vendors in the industry. The aim of this paper is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Optimized and Energy Efficient Multicast Routing Algorithm for Wireless Mobile Ad Hoc Networks Using Genetic Algorithm Approach

    In ad hoc networks, mobile node battery energy is finite and represents one of the greatest constraints for designing multicast routing protocols. In regards to the battery lifetime limitation in supporting multicast routing, some studies have investigated a power saving network layer. These proposed methods have always considered several techniques...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Comparability of PTS & SLM PAPR Reduction Techniques in MIMO-OFDM System

    This paper enhances SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) which are known as PAPR reduction methods for OFDM. And comparison of both PTS and SLM technique discussed. Multicarrier systems suffer from a high Peak-to-Average power Ratio (PAR) of their transmit signal as large signal peaks lead to power...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Modified Approach to Multipath Routing Protocols in Mobile Adhoc Networks

    Mobile ad hoc networks are typically characterized by high mobility and frequent link failures. As a result, routing algorithms selecting a single path during route creation have to make frequent route discoveries resulting in decreased throughput and high end-to-end delay. Multipath routing approaches like DSR make use of pre-computed routes...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Performance Analysis of FTTH Gigabit Ethernet Passive Optical Network (GEPON) System With Triple Play Services

    In the paper performance of the FTTH Gigabit Ethernet Passive Optical Network (GEPON) system with triple play services such as video broadcast at 1550 nm and voice over IP and high speed internet at 1490 nm with 1:32 splitting is evaluated using FEC technique. By using the FEC (Forward Error...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Advanced Modeling of Packet Switched Network in WAP

    Computer networks form an essential substrate for the multitude of distributed application which is now an essential part of modern business and personal life. It is important to optimize the performance of computer networks, so that users can derive optimum utility from the expertise in network infrastructure. Most networks perform...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Dynamic Address Management in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A number of mobile devices may connect together to form one network. Address auto-configuration is an important issue for ad hoc networks in order to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Multiparty Computation Using Homomorphic Encryption

    Secure multiparty computation has become most popular research now days. Multiple parties want to perform a function with the data possessed by each party without disclosing the data to each other and without the involvement of a trusted third party. This paper deals with the computation of sum of n...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Exploration of Three Dimensional Codes Based on Model A and Model B Using Algebraic Congruent Operator in OCDMA System

    Algebraic congruent codes utilizes congruent operators within the Galois field to obtain the address sequences of different users for OCDMA system. With same or different operators, different sequences could be generated based on model A and model B, such as prime sequences, quadratic congruent sequences, hyperbolic congruent sequences, and cubic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Security in Wireless Sensor Network With Broadcast

    Wireless Sensor Networks (WSN) is an emerging technology and day-by-day it is attracting the attention of researchers with its challenging characteristics. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN. Security...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    HALARM: Heterogeneous Alarm to Withstand DOS Attacks

    Data mining based information processing in MANET is at its entering stage, as compared to traditional machine learning and MANET. Currently, researches mainly focus on applying machine learning techniques to solve a particular problem in MANET. Different researchers will have different assumptions, application scenarios and preferences in applying machine learning...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Biased and Secured Time Synchronized Protocol for Wireless Sensor Networks

    In a wireless sensor network a large number of sensors are deployed for the purpose of sensing and bring the data back securely to nearby base stations. The base stations then perform the costly computation on behalf of the sensors to analyze the data sensed by the sensors. Due to...

    Provided By International forum of researchers Students and Academician