International forum of researchers Students and Academician

Displaying 81-120 of 537 results

  • White Papers // Feb 2014

    Recent Position and Open Problems : A Study on Protection in Pervasive Wireless Device

    Million of wireless device clients are ever progressing, getting to be more subject to their PDAs, smart phones, also other handheld devices. With the headway of pervasive computing, new and unique proficiencies are accessible to help mobile social orders. The wireless nature of these devices has encouraged another time of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Extended Hill Cipher Encryption by Using Transposed Interweaved Shifting

    Generally in Hill cipher modifications interweaving are considered. This paper reveals that the strength of this cipher is due to non-linear transformation of interweave transposition and shifting used in them. The impact of number of iterations on the avalanche effect is investigated. The interweaving of the resulting plaintext, at each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Search and Update Based Solutions to Locate Mobile Agents in the Global Network

    Mobile agent location monitoring is an important mechanism in highly dynamic and large-scale networks to control and communicate with agents after launching. Different applications require different level of interaction with mobile agent after launching. This paper presents the idea of Location Policy Manager (LPM), a component of mobile agent system...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Congestion Prevention Technique for Miscellaneous Traffic Network

    The increase in various types of applications such as interactive, multimedia, voice, or data on portable devices leads to a miscellaneous traffic load in network. The availability of different network generations and ad-hoc networks also give birth to a miscellaneous traffic in the network. The bandwidth requirement of such type...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Synthesis of Protocol Converters Using the Timed Petri Net Model for Opportunistic Network

    Non homogeneous opportunistic network needs a protocol converter for reliable and efficient communication. Most protocol converters are designed based on the Communicating Finite State Machine (CFSM) as the formal description technique to describe the protocols, their services and converter design. The main drawbacks of CFSM model are state explosion problem...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Location Management Cost in GSM

    To handle call delivery for mobile station, it's probable location should be known to the network. For that location management is required. Location management has two basic operations: location update and paging. The goal of an efficient location management scheme is to maintain and provide locations of mobile stations at...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A New Algorithm to Combat Multiple Attacks in Wireless Adhoc Networks

    Ad hoc network is a multi-hop wireless network independently of any base station or fixed infrastructure. In ad hoc network, all networking functions must be performed by the nodes themselves. Thus each node acts not only as a terminal but also a router. The routers are free to move randomly...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Optimisation Techniques for Packet Forwarding Through Power Heterogeneous Manets

    A Mobile Ad hoc NETwork (MANET) is a self configuring infrastructure less network of mobile devices connected by wireless. Power heterogeneity is common in mobile ad hoc networks. By using high power nodes mobile ad-hoc network can improve network broadcasting robustness, scalability and connectivity. The high power nodes are severely...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A Framework for Secure and Scheduling Mechanism in Vehicular Adhoc Networks

    Vehicular Ad hoc NETwork (VANET) are the subset of Mobile Ad hoc NETwork (MANET) in which the communication nodes are mainly vehicles. It connects vehicles which are in 100-300m in wide range. As vehicles fall or drop out of network other vehicle will join and mobile internet is created. Service...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Performance Analysis of Rake Receiver for CDMA System in Mobile Communication

    In this paper, the author has tried to present a performance of rake receiver for Code Division Multiple Access (CDMA) system in mobile communication. Rake receiver is the efficient receiver which is used in Code Division Multiple Access (CDMA) technology. In this paper, the author have measure Bit Error Rate...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Error Analysis in Multi Carrier Multi User Wireless Network with and without Pre-Coding

    In this paper, the authors are used in improving diversity of multi-user system from the wireless network to combat fading in wireless channel using multi-carrier wireless network. It also uses this paper to improve risk of error in multi-user with a wireless network with pre-coding. Wireless network includes several multiple...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A Modified VIKOR Method for Network Selection in Heterogeneous Networks

    Network selection is major issue for vertical handover decision in heterogeneous networks. With the emerging mix of beyond 3G or fourth generation wireless technology it is difficult for one service provide to provide ubiquitous access to every user. Further every network offers variety of services to the user in one...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    A Review and Comperision of Wireless Ad-Hoc Networks

    Today's, internet has been developed for more than forty years. Recently many network researchers are studying networks based on new communication techniques, especially wireless communications. Wireless networks allow hosts to roam without the constraints of wired connections. People can deploy a wireless network easily and quickly. End users can move...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Use of Artificial Intelligent for Building Automation Systems

    In this paper, the authors proposed a system architecture which presents a fire control system using distributed mobile agents. In recent years, mobile agents have attracted considerable interest in distributed systems. In mobile agent technology, a program, in the form of software agent, can suspend its execution on the host...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2014

    Melody Generator- A Parallel Processing Approach

    Parallel processing shows considerable potential to deliver cost-effective solutions to applications with high requirements in performance. Parallel computing is an evolution of serial computing that attempts to emulate what has always been the state of affairs in the natural world: many complex, interrelated events happening at the same time, yet...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Home automation System Using Cloud Computing and Mobile Devices

    Home automation, as a model of pervasive computing, is progressively becoming substantial for people homed in developed societies. With the proliferation in the usage of household electronic and electrical appliances, numerous data and multifarious control-slevycumbersome burden on residential home automation control units, making it expensive and difficult for the users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Comparative Study of FPGA Based Systems

    In this paper, the authors review the Field Programmable Gate Array (FPGA) with the focus on FPGA-based systems. The over view of FPGA and FPG A programming is represented in the literature. FPGA-based neural networks are provided in order to highlight the best advantage by using FPGA with this type...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Embedded System for Earthquake Victims

    The unprecedented scale and number of natural and man-made disasters in the past decade has urged International emergency search and rescue communities to seek for novel technology to enhance operation efficiency. Embedded search and rescue system that can navigate into material to search for victims and transfer critical field data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    An Efficient Test Vector Compression Scheme for SoC Design

    Memory is one of the most restricted resources in the embedded system design. Larger test data size in System-on-Chip (SoC) demands not only higher memory requirements, but also an increase in testing time. Code compression techniques have been used to address this issue by reducing the code size of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Microcontroller Based Speed Control of DC Motor Through RS 232 Interface with PC

    Role of electrical drives is a major concern in industrial automation. Industrial applications use dc motors because the speed-torque relationship can be varied to almost any useful form for both dc motor and regeneration applications in either direction of rotation. DC motors are often applied where they momentarily deliver three...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Artificial Immune System for Intrusion Detection for Routing Protocol in MANET

    Security is an important issue in Mobile Ad hoc NETwork (MANET) due to a faulty or malicious node which gives rise to vulnerability by routing misbehaviour. System proposed here focuses on the concept of Artificial Immune Systems (AIS) which is computational paradigms that belong to the computational intelligence family and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Defending Against SSDF Attack and Detecting Selfish Attack in Cooperative Spectrum Sensing for Cognitive Radio

    Cooperative spectrum sensing is envisaged to increase reliability in cognitive radio networks. Several users cooperate to detect the availability of a wireless channel. In this framework, some malicious users may affect the decisions taken by the cognitive users by providing false information, introducing Spectrum Sensing Data Falsification (SSDF). In this...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    AZURE - A Strategy of PaaS (Platform as a Service)

    PaaS (Platform-as-a-Service) is the powerful service of the cloud computing that can quickly gain strong competitive projects, and focus administrators on systems rather than servers as well as helps architects evaluate new technologies quickly and directly. PaaS is provided by so many servers in the market such as Amazon, Red...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    The Exploring the Business Economics of Cloud Computing

    In traditional IT settings, the economics of cloud computing enable the people to take on a strategic project in a weakening economic climate that would never have seen the light of day, that's the true economics of cloud computing. In many cases, a cloud solution will be cheaper in isolation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Innovation and Development of Business Finder Application using Android

    Mobile applications can be one of the best ways to keep consumers engaged with a brand as they are on the move. With the increase in demand for smart phones and efficiency of wireless networks, the demand for mobile applications has increased incredibly. Android is one of the most popular...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    A Survey on Content Based Filtering of Undesirable Messages and Blocking of Misbehaving Users from OSN User Walls

    Now-a-days, online social networking plays very important role in day-to-day life. Users upload their images, audio, video and also other information on OSN. This uploaded data may contain some unwanted messages like abusive words or words that show some political, religious, violence view or any offensive words which may disturbs...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Theory and Features of Cloud Computing

    The essentials and features of cloud computing gives an overview of cloud computing and emphasizing on the architecture required for creating clouds and how clouds are used for leveraging technologies such as Virtual Machines (VMs) in the market. It also provides insights on market-based resource management strategies that encompass both...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Machine Learning Techniques and Data Mining in Computer Security

    Data Mining (DM) is considered as an interdisciplinary discipline. People try to solve large scale DM problems using Artificial Intelligence (AI) techniques for real world applications such as industrial, social, healthcare, predictive toxicology, and bio, chemo-informatics. This paper intends to address some confusion issues related to overlapping notions in data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2014

    Evaluating Effectiveness of Mobile Web Search Personalization using Explicit & Implicit User Profiles

    The system proposes a hybrid approach to combine explicit & implicit user profiles for mobile web search personalization. User profiles are used to retrieve search results according to user relevance. Generally implicit profiles tracked by users clickthrough data & its GPS data are widely used for personalization purpose. Explicit user...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Cooperative Communication Based on Power Consumption Control in MANETS

    Cooperative communication is the main accessing point in present days. These results can be accessed through proactive protocol like route request packet sending and route request packet receiving. The main issue is how communication can be done in MANETS. Mobile ad-hoc networks are self-configurable networks; each node behaves like server...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Energy Efficient Sharing and Multicasting of Video Over Wireless Networks

    Multicasting video over wireless networks is a best effort service. To multicast a video, scalable video coding with spatial, temporal and quality scalabilities is adopted. Scalable video multicast system consists of channel probing stage and transmission stage. The optimal resource allocation problem is formulated by maximizing the video quality of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    A Study on Routing Attacks and Key Solutions in MANETs

    Mobile Ad-hoc NETworks (MANETs) is one of the most promising fields for research and development of wireless network, wireless ad-hoc networks has now become one of the most vibrant and active field of communication networks. The wireless and distributed nature of MANETs poses a great challenge to system security designers....

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Large Data Reconfiguration Using Byzantine Fault Technique

    In this paper, the authors describe a knowledge large data storage that exploits local data versioning within each storage-node. With Byzantine failures technique of clients and server. The storage nodes work to client and high optimistic operations. This can be problematic in long-lived, large-scale systems where system membership is likely...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Algorithms for Anonymization Principles to Achieve Better Privacy in Data Publication

    ANGEL, a technique used for data publication. It publishes the original data in the form of BT (Batch Table) and GT (Generalized Table). This Technique uses anonymization principles such as k-anonymity and l-diversity. This paper also uses an advanced anonymization principle called t-closeness for smaller data sets and (n, t)-closeness...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Improving Maximal Frequent Itemset Mining for Sparse Dataset

    Mining of maximal frequent patterns is a basic problem in data mining applications. Small and useful association rules can be generated from maximal frequent itemset. The algorithms which are used to generate the maximal frequent patterns must perform efficiently. Most of the existing algorithms passed all frequent itemsets as candidates...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Study on Collaborative Web Mining Approaches

    Internet has become main source of information. With the popularization of computers and internet, even the common people find it useful to satisfy even their minute day-to-day information needs. At the same time it is an encyclopedia of all knowledge domains and an efficient medium of information sharing. However, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Study and Analysis of Active Data Warehousing and its Implementation in Sun Oracle Data Base

    Business Intelligence (BI) is becoming an important part of more organizations' day-to-day operations, and active data warehousing is a prime enabling technology. As with many good business technologies, the concept of active data warehousing was born from user requirements rather than from vendors' technological ability. With active data warehousing, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Hierarchical Bisecting Clustering with Multi View-Point Based Similarity Measure

    Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation and browsing mechanisms. There are some clustering methods which have to assume some cluster relationship among the data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Rough Set Based Privacy Preserving Attribute Reduction on Vertically Partitioned Data and Generation of Rules

    Data mining is the process of extracting knowledge from various databases. For security reasons organizations may partition their data horizontally or vertically. Another situation is hospitals maintaining sensitive information about patients. This paper can also be treated as vertical partitioning of data if all the hospitals maintain data in the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Streaming Data Ware Houses Modernization Under the Process of Scalable Scheduling

    Data mining is the process of analyzing data from different perspectives and summarizing it into useful information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many...

    Provided By International forum of researchers Students and Academician

  • White Papers // Mar 2011

    Analysis of Energy Efficient End to End Delay for Wireless Sensor Network

    Reducing the energy consumption and increasing the lifetime is the major concern in Wireless Sensor Network (WSN). In most event driven surveillance applications, the end to end delay should also be minimized. In WSN most of the energy is consumed when sensor nodes are on and waiting for an events....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Node Based Radio Network Planning

    An efficient allocation of radio network planning is essential for ensuring good performance of cellular networks, given the limited spectrum available to meet the growth of demand. Previous work on analogue and second generation mobile communications has led to several channel allocation scheme and propagation model based on radio network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Issues in MWiMax Handover

    Recent research in WiMax handover delay has been strongly influenced by new developments in handover techniques. This paper presents a literature survey of various handover techniques in MWiMax till date which compares their performance in terms of their handover delay and QOS. This paper provides fast handover scanning scheme, enhanced...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Location Based Service: A Case Study Location Based Messenger

    This paper aims at location based messenger. The concept described here helps tracking the people with respect to their location and also the users who are in the same cell area are able to chat. Initially the user has to register with the service to avail this facility. One who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Joint Source Channel Coding for Reliable Video Transmission Over an AWGN Channel

    In this paper, a Joint Source Channel Coding (JSCC) video communication system is presented. The goal of JSCC is to distribute the total fixed bit rate to source coder and channel coder so that the end to end distortion is minimized. Due to development of DCT, Motion Estimation, Compensation and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    An Efficient Network Readiness Assessment Agent to Deploy Various Media Rich Applications

    Video is a powerful business tool. Various organizations make use of video applications for their business purposes. Applications which use video as one of media is called media rich applications. Media rich applications are highly interactive applications which require real time transfer of data with no delay or packet loss....

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Implementation of Security in Zone Routing in Mobile Ad-Hoc Networks Using SZRP

    This paper focuses on routing approaches in mobile ad hoc networks from the security viewpoint. In this paper, the authors analyze the threats against ad-hoc routing protocols and presented the requirements that need to be addressed for secure routing. Existing secure routing protocols for mobile ad hoc networks are either...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Performance Analysis of QoS Based Multimedia Real-Time Protocol

    Many multimedia applications require guaranteed Quality of Service (QoS) in communication networks. Typically, the QoS includes bandwidth, delay and delay jitter. This paper presents a real-time protocol to support multimedia communications in which the Connections are established with efficient resource reservation and proper admission control. During data transmission, the rate,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Dual Loop Layout Design of Backhaul Link for CDMA Cellular Communication System in Border Areas

    To exploit the advantages of cellular communication system which provides high mobility, quick connectivity and easier to carry being light weight? Hence the cellular communication system is very useful for the defence forces deployed all along the border. CDMA based cellular communication system has inherent security. Hence, it is preferred...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    A Tour to Detect Dishonesty on UNIX Shell Script Programming Assignment

    Plagiarism in the sense of "Theft of intellectual property" has been around for as long as humans have produced work of art and research. However, easy access to the Web, large databases, and telecommunication in general, has turned plagiarism into a serious problem for educational institutions. "Plagiarism attacks the fundamental...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Next Generation Services: Mobile Cloud Computing

    Mobile Cloud computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. In cloud computing the computing resources such as processor, memory, and storage are not physically present at the users' location. Instead, the computing resources are owned and managed by a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Low Power Radio Frequency Design for Body Area Network

    Today in this world of medical computing, health monitoring equipments have form an integral part of the biomedical engineering field. The body area network forms an essential part of medical data analysis. The paper here describes the various kinds of body area networks, the frequency bands used MICS and ISM,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Security in GSM Cellular Standard by Cryptographic Algorithms

    Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. GSM is most widely used cellular standard in the world. Mobile network is the shared media. When the media are shared, any...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Mehodology for Low Power Radio Frequency Design for Body Area Network

    The body area network forms an essential part of medical data analysis. The paper here describes the various kinds of body area networks, the frequency bands used MICS and ISM, the antennas used in the analytic nodes. The dual band antenna using the split ring resonator with a microstrip patch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    A Security Set of SMPP Protocol for SMS and Applications

    According to the security requirement of the Short Message Service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of Wireless Public Key Infrastructure (WPKI)....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    In Data Stream Association Rule Mining Research Problems: An Overview

    So many applications of data streams in the world where the people require association rule mining, like network intrusion detection, sensor network, financial monitoring, web click streams analysis and network traffic monitoring. Data streams are different from traditional static databases This thing raises new problems that need to be considered...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Bipartition of VLSI Circuits Using Simulated Annealing Technique

    The bi-partitioning of VLSI circuit is made using simulated annealing algorithm. The parameters used in annealing process are initial temperature, cooling rate and threshold (maximum number of iterations). The circuit is partitioned in two partitions and number of interconnections is find out between two partitions. The number of interconnection between...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Optimized Bandwidth of Rectangular Microstrip Antennas

    Microstrip antennas are well suited for wireless and mobile application due to their low-weight, low volume and low sensitivity to manufacturing tolerance. In this paper, the authors analyze the properties and design method of microstrip antenna and then design the microstrip antenna with MATLAB using cavity model method and simulate...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Study of Supply Chain Based on Agent and Multi-Behavior Agent Model

    In today's industrial context, competitiveness is closely associated to supply chain performance. Coordination between business units is essential to increase this performance, In order to produce and deliver products on time to customers/manufacturer at a competitive price. The most important task of the Supply Chain Management (SCM) is to reconfigure...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Routing Optimization Using Genetic Algorithm in Mobile Ad Hoc Network

    Mobile ad-hoc networks usually consist of mobile battery operated computing devices that communicate over the wireless medium and they have limited battery capacity. In this the author have proposed protocol provides secure and adaptive backup routing protocol for MANET. Genetic Algorithm (GA) is used to find the optimal path from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Review on the Effects of Reader/Tag Antenna Parameters on Read Range of UHF Passive RFID System

    The performance RFID system is dependent on many factors. Read Range is one factor which describes the performance of passive RFID system. Read range depends on the parameters of both the reader and the tag. It also depends on its application environment. This paper gives a brief introduction to an...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Design & Development of "Programmable Security Controller (PSC) (A Nanotechnology Device)" for WiMAX/WiFi Wireless Communication

    WiMAX (World-wide Interoperability for Microwave Access) will offer broadband wireless access at data rate of multiple mega bits per second to the end-user within a range of several kilometers. WiMAX is a complement to fixed, portable and mobile access for wireless communications. Application of nanotechnology is taking place in WiMAX/Wi-Fi...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    DHT Based Routing Protocols for MANETs: A Survey

    A Mobile Ad-hoc NETwork (MANET) is a temporary wireless network composed of mobile nodes, in which there is no infrastructure. The mobile nodes can dynamically exchange data among themselves. Because of these characteristics, path connecting source nodes with destination may be very unstable and go down at any time, making...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    MANET Internet Integration: A Survey Based Study

    Mobile ad hoc network being easy to deploy, self organized, flexible and independent of any pre-established infrastructure has become main component of research. But the research in the field of ad hoc network is restricted to stand-alone isolated networks. To widen the network coverage and application domain of ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Secure Authentication Scheme for Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors' studies show that there are performance and security problems with the existing authentication and keying mechanisms which are currently employed by wireless ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Capacity and Cell Range Assessment for Multitraffic User in Mobile WiMAX

    Radio technology advanced rapidly to enable transmission over larger distances with better quality, less power, smaller and cheaper devices. A cursory look into the history of wireless communications will reveal that every new wireless system improved on previous ones. The chance for WiMAX (IEEE -802.16e-2005 standard) to serve those who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Two Phase Energy Optimisation in Android Phones

    'Computing eats up energy' - and it's not a trivial matter. Processors are said to be the incipient of modern day computing era. Deploying the best processor is always marked by the one which leads to highest efficiency in energy saving without degrading system's performance. In this battle-ground of Excellency...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Dynamic Periphery Multicast Routing Protocol

    In this paper, the authors describe a new multicast routing protocol for mobile ad hoc wireless networks. The protocol establishes a source based mesh of nodes called with no static periphery or zone to distribute data for that source. The notion of zone or a flooding group is different the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Propagation Path Loss Measurements and Spline Interpolation for Missing Data

    Now-a-days the most of straight wired network systems are replaced by the wireless network systems. The authors know the main difference in between these two is the change from a fixed network location to mobile network location, i.e., an address is no longer a physical location and an address will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Handover Probability Analysis for B3G Heterogeneous Wireless Networks

    Wireless communications play an important role for providing global information access to the users. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks and also meets the challenges for the emerging...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Identifying Mischievous Users in Private Networks and Status Updating in Android Mobile

    Basically in anonymizing networks users privately access Internet services with the help of routers; the reason behind this is to hide the user's IP address. The disadvantage here is that users are taking advantage of this to deface websites. To overcome this problem administrator tries to block IP address of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    ERP IN E-Business World

    ERP is the acronym for Enterprise Resource Planning. ERP is a software application to improve the performance of organizations' resource planning, management control and operational control. ERP software is multi-module application software that integrates activities across functional departments, from product planning, parts purchasing, inventory control, product distribution, order tracking. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multi Criteria Based Multicast Routing for Wireless Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate whereas the others need the aid of intermediate nodes to route their packets. These networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Static Voltage Stability Indication in a Power System Using ANN

    The paper presents an approach for indication of static voltage stability conditions of a power system using Artificial Neural Network (ANN) as a correlator to correlate voltage stability index and bus loading index and corresponding bus voltage. The approach uses voltage stability indices and bus loading indices along with bus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Improved ODMRP With Motion Detection Approach

    Many network applications require transmitting the same single copy of data packets concurrently to many destinations. Applying the infrastructure-based multicast routing protocols in Mobile Ad hoc wireless NETworks (MANETs) is a big challenge. Factors that make Multicasting in ad hoc networks is more complex than in wired networks are host...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Interworking of 3G and 802.11 Networks: Present and the Future Ahead

    With the wide-spread deployment of 3G services in most of the countries and continuous increasing demand of Smartphones and iPhones, past has experienced a substantial increase in cellular data traffic. Since the licensed spectrum over which the 3G services are delivered is costly and scarce, mobile operators have already started...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multicast Genetic Zone Routing Protocol

    Multicast Zone Routing Protocol (MGRP) is the most promising and widely accepted and well proved hybrid routing protocol in Mobile Ad-hoc NETworks (MANETs) for its performance when compared in order to load balance the network, with table-driven demand protocols. This study is aimed to provide a set of available paths...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Mobile Crawler Using Aglets Technology Instead Web Crawlers

    To search Information on the Internet (World Wide Web) users make use of search engines. To search the user's information search engines make use of the Web Crawlers. Web crawlers has to index millions of web pages to make the searching efficient, also web crawlers has to visit the web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Pragmatic Study of Underwater Acoustic Sensor Network and Global Wireless Network

    Two third of the earth is covered with water and there has been a growing interest in monitoring underwater medium for scientific exploration and attack protection. Underwater sensor nodes will find application in ocean-graphic data collection, pollution monitoring, disaster prevention and tactical surveillance application. Underwater network consist of a variable...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Common Radio Resource Management for Heterogeneous Wireless Network

    A major challenge of the heterogeneous network is the Radio Resource Management (RRM) strategy. Common RRM (CRRM) is proposed to jointly manage radio resources among different Radio Access Technologies (RATs) in an optimized way. Heterogeneous wireless systems are envisaged as the integration and joint cooperative management of diverse radio access...

    Provided By International forum of researchers Students and Academician