International forum of researchers Students and Academician

Displaying 1-40 of 325 results

  • White Papers // Feb 2013

    Survey on Data Mining in Cloud Computing

    Data and information has a significant role on human activities, thus data sources are growing to be larger and distributed. But the main problem is not storing data; it is analyzing, mine, and process data for understanding it. Current era is of networking and communication; people are interested in keeping...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Approach for Enhancement of Data Security in Cloud Computing-A Review

    Cloud computing is an emerging trend which can transform information technology and the way it is used. The main issue is data security as it should not be a concern over the large data to be shared in cloud and hence not limit its use. This is a review of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Optimized Data Warehouse Model Through Pentaho ETL Tool

    Extraction-Transformation-Loading (ETL) tools are available for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In this paper, the authors have focus on how to build optimized data warehouse model through Pentaho ETL tool. Initially they have taken data set that is given...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Review on RFID Data Cleaning Problem Using Data Mining Tools

    The data stream produced by RFID reader is sometimes inaccurate. As a result there is a big load of unreliable data which is useless for higher level processing. Therefore the authors need to clean this unreliable data which they sometimes call dirty data. Dirty data appears in three reading errors...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Vehicular Traffic Surveillance Using Multiple Methodology

    Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages and applications. One of the applications of digital image processing is for traffic analysis. In literature survey found that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Indoor Location Determination by Using RFIDs

    With the Growing usage of smart software that uses the location information, automatic location sensing became a necessity in everyday life. There is the Global Positioning System (GPS) which is a satellite based navigation system made up of a network of 24 satellites placed into orbit. GPS is widely used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Routing in Manets

    A Mobile Ad-hoc NETwork is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploying an infrastructure is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Online Strategy Proof Mechanism for Dynamic Spectrum Allocation in Cognitive Radios

    With the ever-increasing and dramatic development of wireless networks and mobile technologies the scarcity of spectrum in the spectrum market has been a natural phenomenon over the last few years. The challenge is taken up in the cognitive radio technologies to alleviate this scarcity by managing and efficiently redistributing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Survey of Security Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are becoming very attractive for both telecommunication and network industry. WSNs are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today Wireless Sensor Networks are broadly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Acquisition and Delivery in Traffic Monitoring VANETs Joint Optimization

    Vehicular Ad-hoc NETworks (VANETs) are envisaged to become a flexible platform for monitoring road traffic, which will gradually replace more cumbersome fixed sensor deployments. The efficacy of vehicle-assisted traffic monitoring systems depends on the freshness of traffic data that they can deliver to users, and the bandwidth used to do...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Remote Monitoring & Control of Wireless Sensor Network Using Smart Phone

    In this paper, the authors describe the design of a Wireless Sensor Network based on ZigBee technology. It is mainly used for collecting and transferring the various monitoring information about the coal mine underground with the help of WSN. Then the data will be analyzed and processed in the monitoring...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Embedded Based Finger Print Recognition System For Time and Attendance

    The main objective of this paper is to develop an embedded system, which will record the time and attendance of an employee in an organization and send monthly record of employee's work hours to organization using finger print recognition module which is interfaced with microcontroller. Whenever the employee enters the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2013

    Monitoring & Detecting the Application Layer DDOS Attacks that Affects Popular Websites

    One of the major threats for the Internet's reliability and stability is Distributed Denial-Of-Service (DDOS) attack. The attackers are becoming more sophisticated and organized; also several high-profile attacks targeted prominent websites. These are the prime reasons that gained importance for the study of DDOS attack detection and prevention. It becomes...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Review on Data Security in Data Warehousing

    Data Warehouses are used for storing historic and current data and are used for creating trending reports for annual and quarterly comparisons for the enterprises. Data Warehouses are the most valuable assets which contains critical business data and information for the enterprises in today's world. Most of the existing data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Approach for Efficient Delay Tolerant Networks Using Conditional Shortest Path Routing

    This paper deals with Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Improving Network Processing Technique in Internet Controlled Embedded Systems

    The RTCS Embedded Internet stack provides IP networking for the MQX platform. RTCS is provided with a rich assortment of TCP/IP networking application protocols and uses the MQX RTOS drivers for Ethernet or serial connectivity. RTCS is tightly integrated with the latest ColdFire and Power Architecture processors from Freescale and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Secure Usability Design System for User Authentication

    The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Performance Evaluation of Different Level Modulation Schemes for an Efficient Mobile WiMAX System in OFDM Under Rayleigh Fading and AWGN Channel

    Mobile WiMAX technology has become one of the fastest growing arenas of internet accessing in the people modern daily life. WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) to provide a worldwide interoperability for microwave access. IEEE 802.16e-2005 has been developed for mobile wireless communication which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Path Optimization CBET Technique Using for MANETS

    Efficient scheduling of processes on processors of a Network Of Workstations (NOW) is essential for good system performance. However, the design of such schedulers is challenging because of the complex interaction between several system and workload parameters. Co-scheduling, though desirable, is impractical for such a loosely coupled environment. Two operations,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Optimized Routing Algorithm for Congestion Control in Wireless Sensor Networks

    The previous routing approaches like Purely Random Propagation (PRP), Non-Repetitive purely Random Propagation (NRRP), Directed Random Propagation (DRP) perform the routing of packets without considering congestion might occur. When the intermediate nodes receive a huge amount of packets they directly drop the packets. The second problem is that there will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Route Handoff Using Channel Aware Routing Protocol in MANETs

    A Mobile Ad-hoc NETwork (MANETs) is a spontaneous network that can be established with no fixed infrastructure. Mobile ad-hoc networks are characterized by multi-hop wireless links and absence of any cellular infrastructure. Transmissions of packets are impaired by radio link fluctuations. Thus, in this paper an enhanced, channel aware routing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Integer Wavelet Based Steganographic Model by Selecting Variable Bit Length

    To enhance the embedding capacity of image steganography and provide an Imperceptible stego-image for human vision, an integer wavelet based data hiding with variable bit length substitution method employing secret-key is proposed in this paper. The new technique embeds binary bit stream in 8-bit color image (RGB channel). The technique...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Technique to Secure Communication Using Chaos Generated by Non-Linear Circuits

    Secure communication is effected by encoding and decoding a simple message using chaotic non-linear circuits. A Non Linear Circuit is designed for generating the chaos in its output voltage. Time evolutions of generated chaos are studied with respect to two of the operating parameters of the circuit. Chaotic regimes of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Evaluation Model for Threshold Cryptography in MANETS

    A Mobile Ad hoc NETwork (MANET) is a collection of low-power, wireless, mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. In comparison with traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure instead hosts rely on each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Multi-Path Dynamic Routing for Computing and Constrained Mobile Ad-Hoc Network Environment

    Wireless mobile ad-hoc networks are classified as networks where nodes are logically connected with each other. These types of networks do not have fixed topology due to the mobility property of nodes, interference, propagation and loss of path. Hence a dynamic source routing protocol is required for these networks to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Survey on Unicast and Multicast Routing Protocols for Mobile Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Intrusion Detection System in Ad-Hoc Network

    Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Advanced Modeling of Packet Switched Network in WAP

    Computer networks form an essential substrate for the multitude of distributed application which is now an essential part of modern business and personal life. It is important to optimize the performance of computer networks, so that users can derive optimum utility from the expertise in network infrastructure. Most networks perform...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Round Robin CPU Scheduling Algorithm

    The main aim of this paper is to propose a new approach for round robin scheduling which helps to improve the performance of CPU in real time and time sharing operating system. Existing CPU scheduling algorithm cannot be implemented in real time operating system due to their high context switch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparison of Position Based Routing Protocol and Topology Based Routing Protocol in VANET

    The Vehicular Ad hoc NETwork (VANET) is an emerging new technology. Which will make the life easy VANET is one of the influencing areas for the improvement of Intelligent Transportation System (ITS) in order to provide safety and comfort to the road users. Besides safety applications VANET also provide comfort...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Effective Synthesis of Health Science and Telemedicine by Using Body Area Network

    Body Area Networks (BANs) are wearable wireless sensor networks with a high potential for medical and sports applications. A body area network is formally defined as, "A communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Dynamic Address Management in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A number of mobile devices may connect together to form one network. Address auto-configuration is an important issue for ad hoc networks in order to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Multiparty Computation Using Homomorphic Encryption

    Secure multiparty computation has become most popular research now days. Multiple parties want to perform a function with the data possessed by each party without disclosing the data to each other and without the involvement of a trusted third party. This paper deals with the computation of sum of n...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    A Security Set of SMPP Protocol for SMS and Applications

    According to the security requirement of the Short Message Service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of Wireless Public Key Infrastructure (WPKI)....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    In Data Stream Association Rule Mining Research Problems: An Overview

    So many applications of data streams in the world where the people require association rule mining, like network intrusion detection, sensor network, financial monitoring, web click streams analysis and network traffic monitoring. Data streams are different from traditional static databases This thing raises new problems that need to be considered...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Bipartition of VLSI Circuits Using Simulated Annealing Technique

    The bi-partitioning of VLSI circuit is made using simulated annealing algorithm. The parameters used in annealing process are initial temperature, cooling rate and threshold (maximum number of iterations). The circuit is partitioned in two partitions and number of interconnections is find out between two partitions. The number of interconnection between...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Optimized Bandwidth of Rectangular Microstrip Antennas

    Microstrip antennas are well suited for wireless and mobile application due to their low-weight, low volume and low sensitivity to manufacturing tolerance. In this paper, the authors analyze the properties and design method of microstrip antenna and then design the microstrip antenna with MATLAB using cavity model method and simulate...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Study of Supply Chain Based on Agent and Multi-Behavior Agent Model

    In today's industrial context, competitiveness is closely associated to supply chain performance. Coordination between business units is essential to increase this performance, In order to produce and deliver products on time to customers/manufacturer at a competitive price. The most important task of the Supply Chain Management (SCM) is to reconfigure...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Routing Optimization Using Genetic Algorithm in Mobile Ad Hoc Network

    Mobile ad-hoc networks usually consist of mobile battery operated computing devices that communicate over the wireless medium and they have limited battery capacity. In this the author have proposed protocol provides secure and adaptive backup routing protocol for MANET. Genetic Algorithm (GA) is used to find the optimal path from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Review on the Effects of Reader/Tag Antenna Parameters on Read Range of UHF Passive RFID System

    The performance RFID system is dependent on many factors. Read Range is one factor which describes the performance of passive RFID system. Read range depends on the parameters of both the reader and the tag. It also depends on its application environment. This paper gives a brief introduction to an...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Design & Development of "Programmable Security Controller (PSC) (A Nanotechnology Device)" for WiMAX/WiFi Wireless Communication

    WiMAX (World-wide Interoperability for Microwave Access) will offer broadband wireless access at data rate of multiple mega bits per second to the end-user within a range of several kilometers. WiMAX is a complement to fixed, portable and mobile access for wireless communications. Application of nanotechnology is taking place in WiMAX/Wi-Fi...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    DHT Based Routing Protocols for MANETs: A Survey

    A Mobile Ad-hoc NETwork (MANET) is a temporary wireless network composed of mobile nodes, in which there is no infrastructure. The mobile nodes can dynamically exchange data among themselves. Because of these characteristics, path connecting source nodes with destination may be very unstable and go down at any time, making...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    MANET Internet Integration: A Survey Based Study

    Mobile ad hoc network being easy to deploy, self organized, flexible and independent of any pre-established infrastructure has become main component of research. But the research in the field of ad hoc network is restricted to stand-alone isolated networks. To widen the network coverage and application domain of ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Secure Authentication Scheme for Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors' studies show that there are performance and security problems with the existing authentication and keying mechanisms which are currently employed by wireless ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Capacity and Cell Range Assessment for Multitraffic User in Mobile WiMAX

    Radio technology advanced rapidly to enable transmission over larger distances with better quality, less power, smaller and cheaper devices. A cursory look into the history of wireless communications will reveal that every new wireless system improved on previous ones. The chance for WiMAX (IEEE -802.16e-2005 standard) to serve those who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Two Phase Energy Optimisation in Android Phones

    'Computing eats up energy' - and it's not a trivial matter. Processors are said to be the incipient of modern day computing era. Deploying the best processor is always marked by the one which leads to highest efficiency in energy saving without degrading system's performance. In this battle-ground of Excellency...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Dynamic Periphery Multicast Routing Protocol

    In this paper, the authors describe a new multicast routing protocol for mobile ad hoc wireless networks. The protocol establishes a source based mesh of nodes called with no static periphery or zone to distribute data for that source. The notion of zone or a flooding group is different the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Propagation Path Loss Measurements and Spline Interpolation for Missing Data

    Now-a-days the most of straight wired network systems are replaced by the wireless network systems. The authors know the main difference in between these two is the change from a fixed network location to mobile network location, i.e., an address is no longer a physical location and an address will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Handover Probability Analysis for B3G Heterogeneous Wireless Networks

    Wireless communications play an important role for providing global information access to the users. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks and also meets the challenges for the emerging...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Identifying Mischievous Users in Private Networks and Status Updating in Android Mobile

    Basically in anonymizing networks users privately access Internet services with the help of routers; the reason behind this is to hide the user's IP address. The disadvantage here is that users are taking advantage of this to deface websites. To overcome this problem administrator tries to block IP address of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    ERP IN E-Business World

    ERP is the acronym for Enterprise Resource Planning. ERP is a software application to improve the performance of organizations' resource planning, management control and operational control. ERP software is multi-module application software that integrates activities across functional departments, from product planning, parts purchasing, inventory control, product distribution, order tracking. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multi Criteria Based Multicast Routing for Wireless Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate whereas the others need the aid of intermediate nodes to route their packets. These networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Static Voltage Stability Indication in a Power System Using ANN

    The paper presents an approach for indication of static voltage stability conditions of a power system using Artificial Neural Network (ANN) as a correlator to correlate voltage stability index and bus loading index and corresponding bus voltage. The approach uses voltage stability indices and bus loading indices along with bus...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    New Generation Networking Language-REBOL

    REBOL is an advanced interpreted language that lets the user access and controls the resources of the Internet with such ease that they might start thinking of the Internet as their own personal operating system. The user already familiar with how web browsers let their surf the Internet. With REBOL...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Ant Colony Based Novel Routing Protocol for MANET

    Mobile Ad-hoc NETworks (MANETs) are the only reasonable choice when there is no infrastructure wireless network or it is too expensive to build one as in remote areas. Routing is needed to find a path between the source and the destination and to forward the packets even if the destination...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Survey on Various Machine Learning Techniques to Detect and Classify DDoS Attacks

    The rigorousness of Distributed Denial of Service (DDoS) attack exhibit a wide range of security needs. Detection and classification of DDoS attacks has become a very challenging research field. Keeping this in mind and to overcome the DDoS attack, in this paper the authors investigates the machine learning techniques that...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Bluetooth Chat Over Android in Mobile Network

    Android is an operating system for mobile devices such as Smartphones and tablet computers. Android is the first complete, open, and free mobile platform. It is developed by the Open Handset Alliance led by Google. If there's one time when "Cheap and easy" is a benefit, it's with mobile development....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Survey on Dynamic Slicing Techniques for Object-Oriented Programs

    Program slicing is an effective approach to narrow the concern, to the relevant parts of a program. Researchers have proposed various techniques for program slicing since years. In the classification of program slicing, it is found that dynamic slices are smaller than static slices and can be used more efficiently...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Securing OTP Transaction Using Mutual Authentication and Encryption

    Secure authentication schemes between an authentication server and users are required to avoid many risks on the Internet. A new one time password scheme is described which is secure against eavesdropping, server database compromise and generate Static key for encryption at the same time. That scheme is at least as...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Survey on Graphical Methods for Test Case Generation

    Goal of a simple test case generation is to find an input that will drive execution of a program along a particular path in its flow graph. Several researchers have proposed different techniques to generate test cases and in most of the approaches proposed so far, either the source code...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Novel Approach for Securing User Transactions Using Two Factor Mobile Authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. During authentication, credentials presented by an individual are validated and associated with the person's identity. This binding between credentials and identity is typically done for the purpose of granting...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Short Study of Wireless Sensor Networks in Healthcare Applications

    Applications of Wireless Sensor Networks (WSN) are diverse. They range from home security to military surveillance. Advances in technology and high-end protocols developed for WSNs have increased the popularity of WSN in all major areas of application. One such application is healthcare monitoring. WSNs today are widely being used in...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Trust Management in Mobile Ad-Hoc Networks Using a Scalable Maturity-Based Model

    The trust management in mobile ad hoc network is for sending the message from source node to destination node in ad hoc networks. This sending process is based on trusting its neighbor node. The trust is based on previous individual experiences and on the recommendations of others. The Recommendation Exchange...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Clustering Technique for Load Balancing in MANETs

    A Mobile Ad hoc NETworks (MANETs) are a collection of mobile nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure and do not require any central administration. These mobile nodes will act as both node as well as routers. While routing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Interoperability Between Wireless Networks Using FPGA Based Advanced Gateway

    In a communication network, a network node equipped for interoperability with another network can use different protocols and frame formats. So, there is a need for protocol conversion to provide a match between the source and destination networks. To satisfy the requirements of protocol conversion and thus to provide interoperability,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Ensuring QOS in WiMAX Networks

    Quality of Service (QoS) is a key metric for bandwidth demanding applications in WiMAX (IEEE 802.16 standard) networks. It is achieved through bandwidth reservation for each application. Existing solution use priority-based scheduling algorithm to ensure the QoS guaranteed services. Although, it allows the Subscriber Station (SS) to adjust the reserved...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Implementation of Blake and RSA in a Fast Authentication Protocol for Wireless Mesh Networks on FPGA

    Encryption techniques like BLAKE and RSA is implemented in a fast authentication protocol based on tickets, which supports fast handoff mainly in real time applications like VoIP in Wireless Mesh Networks (802.11s). In this authentication protocol, the central server is not involved during authentication thus avoiding multiple hop transmissions. The...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Security Threats on Different Layers of Mobile Ad Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. The ad-hoc networks are a new wireless networking paradigm for...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    On Building Intelligence for Securing Communication Between the Tags and the Mobile Devices

    Tag is a small embedded system meant for identification of an object to which it is attached and in addition the TAGS can be made to be intelligent such that they can identify its own location, alert the master about an event occurring in its vicinity, sensing tampering with its...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Comparability of PTS & SLM PAPR Reduction Techniques in MIMO-OFDM System

    This paper enhances SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) which are known as PAPR reduction methods for OFDM. And comparison of both PTS and SLM technique discussed. Multicarrier systems suffer from a high Peak-to-Average power Ratio (PAR) of their transmit signal as large signal peaks lead to power...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Modified Approach to Multipath Routing Protocols in Mobile Adhoc Networks

    Mobile ad hoc networks are typically characterized by high mobility and frequent link failures. As a result, routing algorithms selecting a single path during route creation have to make frequent route discoveries resulting in decreased throughput and high end-to-end delay. Multipath routing approaches like DSR make use of pre-computed routes...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Performance Analysis of FTTH Gigabit Ethernet Passive Optical Network (GEPON) System With Triple Play Services

    In the paper performance of the FTTH Gigabit Ethernet Passive Optical Network (GEPON) system with triple play services such as video broadcast at 1550 nm and voice over IP and high speed internet at 1490 nm with 1:32 splitting is evaluated using FEC technique. By using the FEC (Forward Error...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Advanced Modeling of Packet Switched Network in WAP

    Computer networks form an essential substrate for the multitude of distributed application which is now an essential part of modern business and personal life. It is important to optimize the performance of computer networks, so that users can derive optimum utility from the expertise in network infrastructure. Most networks perform...

    Provided By International forum of researchers Students and Academician