International forum of researchers Students and Academician

Displaying 81-120 of 388 results

  • White Papers // Nov 2012

    Optimized Routing Algorithm for Congestion Control in Wireless Sensor Networks

    The previous routing approaches like Purely Random Propagation (PRP), Non-Repetitive purely Random Propagation (NRRP), Directed Random Propagation (DRP) perform the routing of packets without considering congestion might occur. When the intermediate nodes receive a huge amount of packets they directly drop the packets. The second problem is that there will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Route Handoff Using Channel Aware Routing Protocol in MANETs

    A Mobile Ad-hoc NETwork (MANETs) is a spontaneous network that can be established with no fixed infrastructure. Mobile ad-hoc networks are characterized by multi-hop wireless links and absence of any cellular infrastructure. Transmissions of packets are impaired by radio link fluctuations. Thus, in this paper an enhanced, channel aware routing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Integer Wavelet Based Steganographic Model by Selecting Variable Bit Length

    To enhance the embedding capacity of image steganography and provide an Imperceptible stego-image for human vision, an integer wavelet based data hiding with variable bit length substitution method employing secret-key is proposed in this paper. The new technique embeds binary bit stream in 8-bit color image (RGB channel). The technique...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a \"Data rich but information poor\" dilemma, data mining emerged. Web mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Web Usage Mining: Pattern Discovery and Forecasting

    Web usage mining: automatic discovery of patterns in click-streams and associated data collected or generated as a result of user interactions with one or more web sites. In this paper, the authors describe web usage mining for their college log files to analyze the behavioral patterns and profiles of users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Advanced Modeling of Packet Switched Network in WAP

    Computer networks form an essential substrate for the multitude of distributed application which is now an essential part of modern business and personal life. It is important to optimize the performance of computer networks, so that users can derive optimum utility from the expertise in network infrastructure. Most networks perform...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Dynamic Address Management in Mobile Ad Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) can be implemented anywhere where there is little or no communication infrastructure, or the existing infrastructure is inconvenient to use. A number of mobile devices may connect together to form one network. Address auto-configuration is an important issue for ad hoc networks in order to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Multiparty Computation Using Homomorphic Encryption

    Secure multiparty computation has become most popular research now days. Multiple parties want to perform a function with the data possessed by each party without disclosing the data to each other and without the involvement of a trusted third party. This paper deals with the computation of sum of n...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Exploration of Three Dimensional Codes Based on Model A and Model B Using Algebraic Congruent Operator in OCDMA System

    Algebraic congruent codes utilizes congruent operators within the Galois field to obtain the address sequences of different users for OCDMA system. With same or different operators, different sequences could be generated based on model A and model B, such as prime sequences, quadratic congruent sequences, hyperbolic congruent sequences, and cubic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Security in Wireless Sensor Network With Broadcast

    Wireless Sensor Networks (WSN) is an emerging technology and day-by-day it is attracting the attention of researchers with its challenging characteristics. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN. Security...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    HALARM: Heterogeneous Alarm to Withstand DOS Attacks

    Data mining based information processing in MANET is at its entering stage, as compared to traditional machine learning and MANET. Currently, researches mainly focus on applying machine learning techniques to solve a particular problem in MANET. Different researchers will have different assumptions, application scenarios and preferences in applying machine learning...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Biased and Secured Time Synchronized Protocol for Wireless Sensor Networks

    In a wireless sensor network a large number of sensors are deployed for the purpose of sensing and bring the data back securely to nearby base stations. The base stations then perform the costly computation on behalf of the sensors to analyze the data sensed by the sensors. Due to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    A Nodal Relational Approach to Database Virtualization

    Virtualization has become a necessarily in today's IT world. Virtualization has successfully reduced the problems like space, time taken in setting up the environments and Green IT problems. But there are certain issues which need to be focused on virtual environments. One of the most important issues is performance. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Approach on Privacy Preserving Data Mining Based on Fuzzy C-Means

    Extracting information from an existing data warehouse and transforming it to a human understandable form for further use is the main objective of data mining. The data mining process does not enclose, any security any person can repossess the information from the data warehouse. The data are categorized in the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Data Mining Techniques for Crime/Terror Databases

    There have been several developments in data mining and the technology is being used for a wide variety of applications. It is also becoming a useful tool for detecting and preventing crime and terrorism. This paper will begin with an overview of the application field or the crime types with...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Data Collection in WSN Using Randomized Dispersive Routes

    In this paper, the authors define the problem to provide security to the network having intruders and reconstruction of original information using Shamir's secret sharing algorithm. The proposed system secure data collection in a Wireless Sensor Network with compromised nodes in order to circumvent or overcome the 'Black Holes'. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Distinct User Identification Method Using Web Log data

    With the Internet usage gaining popularity and the steady growth of users, the World Wide Web has become a huge repository of data and serves as an important platform for the dissemination of information. The users' accesses to Web sites are stored in Web server logs. However, the data stored...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Cookies Based Intrusion Attacks and Detection Techniques Over DRDOS Attack

    Network introduces security problems, threats, risks and other types of attacks like internal and external attack. DoS is the most debilitating attack in the Internet and yet it still remains an open research topic. Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    A Generalized Call Admission Control Scheme for Overflowed Traffic in Multilayer 3G Wireless Mobile Networks

    Multilayer cell structure has become a major trend in the design of 3G wireless mobile networks in order to support the high capacity demand required for various types of traffics in 3G systems. In this type of network an efficient call admission control scheme is required to improve the Quality...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparative Analysis of Energy Consumption in Various Routing Protocol for Mobile Ad Hoc Network

    An ad-hoc network is the cooperative engagement of a collection of mobile hosts without the required intervention of any centralized access point. In this paper, the authors present an innovative design for the operation of such ad-hoc networks. The design of efficient routing protocols is a fundamental problem in a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Parallel Searching Algorithm on Hypercube Interconnection Network

    In the information age, the huge amount of data and information are exchanged which requires fast and efficient searching mechanisms for effective use of this information. There are various sequential searching algorithms to search an element in an unsorted array or sorted array of elements. A number of researchers have...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Round Robin CPU Scheduling Algorithm

    The main aim of this paper is to propose a new approach for round robin scheduling which helps to improve the performance of CPU in real time and time sharing operating system. Existing CPU scheduling algorithm cannot be implemented in real time operating system due to their high context switch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparison of Position Based Routing Protocol and Topology Based Routing Protocol in VANET

    The Vehicular Ad hoc NETwork (VANET) is an emerging new technology. Which will make the life easy VANET is one of the influencing areas for the improvement of Intelligent Transportation System (ITS) in order to provide safety and comfort to the road users. Besides safety applications VANET also provide comfort...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Effective Synthesis of Health Science and Telemedicine by Using Body Area Network

    Body Area Networks (BANs) are wearable wireless sensor networks with a high potential for medical and sports applications. A body area network is formally defined as, "A communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Enhanced Text Document Classification based on Terms and Synonyms Relations

    Data mining is a rapidly developing area in recent years, due to the availability of huge amount of data and the need for converting such data into useful information and knowledge. Now-a-days, a large portion of the information is stored in text databases, which consists of large collections of documents...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Unified Approach for Outlier Detection Using Change Point for Intrusion Detection

    The number of computers connected to a network is increasing and Network Intrusion Detection System (NIDS) is one of the essential to an organization. The challenge here is to react quickly to different events with high detection rates and low false positives for real time traffic. Current research is in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Networking Protocols : Bluetooth Architecture

    Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth SIG. Additional protocols have been adopted from other standards bodies. This paper gives an overview of the core protocols and those adopted protocols that are widely used. The Bluetooth protocol stack is split in two...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Design and Implementation of Artificial Neural Network Architecture for MANET on FPGA Platform

    This paper presents and FPGA implementation of Artificial Neural Network (ANN) is applied in Wireless Ad-Hoc NETwork (WANET) for the performance optimization of Routing protocol and its Hardware implementation using Field Programmable Gate Arrays (FPGA). Artificial Neural Network is designed using MATLAB and its digital architecture implementation is described using...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Software Architecture for Implementing Efficient Power Management Techniques Within Intelligent TAGS

    Power consumption has become a serious issue in the development of remote mobile devices such as intelligent tags where charging and recharging of the battery cannot be done frequently. Longevity of the battery has to be increased by power saving. Many existing techniques address the issue of power management in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Study on Traceability and Human Factors in Agile Practices to Improve Software Quality

    The most noticeable change to software process thinking in the last few years has been the appearance of the word 'Agile'. Agile software development methods were invented to minimize the risk of developing low quality software systems with rigid process-based methods. They impose as little overhead as possible in order...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Cloud E-Learning: A New Virtuous Business Archetype for E-Learning

    Now-a-day, most of predominant education system are becoming not being suitable for necessities of social improvement and educational development and not being able to catch up with the changes of learning demand in time, thus computer networks have brought opportunities for it. In conventional web based E-learning approach, system assembly...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Customizing and Porting of UClinux on Reconfigurable SoC

    Today's reconfigurable hardware devices have huge densities and are partially reconfigurable, allowing for the configuration and execution of hardware tasks in a true multitasking manner. This makes reconfigurable platforms an ideal target for many modern embedded systems that combine high computation demands with dynamic task sets. Such an operating system...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    FPGA and ASIC Implementation of Vedic Multiplier

    The ever increasing demand in enhancing the ability of processors to handle the complex and challenging processes has resulted in the integration of a number of processor cores into one chip. Still the load on the processor is not less in generic system. This load is reduced by supplementing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Mar 2011

    Analysis of Energy Efficient End to End Delay for Wireless Sensor Network

    Reducing the energy consumption and increasing the lifetime is the major concern in Wireless Sensor Network (WSN). In most event driven surveillance applications, the end to end delay should also be minimized. In WSN most of the energy is consumed when sensor nodes are on and waiting for an events....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Node Based Radio Network Planning

    An efficient allocation of radio network planning is essential for ensuring good performance of cellular networks, given the limited spectrum available to meet the growth of demand. Previous work on analogue and second generation mobile communications has led to several channel allocation scheme and propagation model based on radio network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Issues in MWiMax Handover

    Recent research in WiMax handover delay has been strongly influenced by new developments in handover techniques. This paper presents a literature survey of various handover techniques in MWiMax till date which compares their performance in terms of their handover delay and QOS. This paper provides fast handover scanning scheme, enhanced...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Location Based Service: A Case Study Location Based Messenger

    This paper aims at location based messenger. The concept described here helps tracking the people with respect to their location and also the users who are in the same cell area are able to chat. Initially the user has to register with the service to avail this facility. One who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Joint Source Channel Coding for Reliable Video Transmission Over an AWGN Channel

    In this paper, a Joint Source Channel Coding (JSCC) video communication system is presented. The goal of JSCC is to distribute the total fixed bit rate to source coder and channel coder so that the end to end distortion is minimized. Due to development of DCT, Motion Estimation, Compensation and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    An Efficient Network Readiness Assessment Agent to Deploy Various Media Rich Applications

    Video is a powerful business tool. Various organizations make use of video applications for their business purposes. Applications which use video as one of media is called media rich applications. Media rich applications are highly interactive applications which require real time transfer of data with no delay or packet loss....

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Implementation of Security in Zone Routing in Mobile Ad-Hoc Networks Using SZRP

    This paper focuses on routing approaches in mobile ad hoc networks from the security viewpoint. In this paper, the authors analyze the threats against ad-hoc routing protocols and presented the requirements that need to be addressed for secure routing. Existing secure routing protocols for mobile ad hoc networks are either...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Performance Analysis of QoS Based Multimedia Real-Time Protocol

    Many multimedia applications require guaranteed Quality of Service (QoS) in communication networks. Typically, the QoS includes bandwidth, delay and delay jitter. This paper presents a real-time protocol to support multimedia communications in which the Connections are established with efficient resource reservation and proper admission control. During data transmission, the rate,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Dual Loop Layout Design of Backhaul Link for CDMA Cellular Communication System in Border Areas

    To exploit the advantages of cellular communication system which provides high mobility, quick connectivity and easier to carry being light weight? Hence the cellular communication system is very useful for the defence forces deployed all along the border. CDMA based cellular communication system has inherent security. Hence, it is preferred...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    A Tour to Detect Dishonesty on UNIX Shell Script Programming Assignment

    Plagiarism in the sense of "Theft of intellectual property" has been around for as long as humans have produced work of art and research. However, easy access to the Web, large databases, and telecommunication in general, has turned plagiarism into a serious problem for educational institutions. "Plagiarism attacks the fundamental...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Next Generation Services: Mobile Cloud Computing

    Mobile Cloud computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. In cloud computing the computing resources such as processor, memory, and storage are not physically present at the users' location. Instead, the computing resources are owned and managed by a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Low Power Radio Frequency Design for Body Area Network

    Today in this world of medical computing, health monitoring equipments have form an integral part of the biomedical engineering field. The body area network forms an essential part of medical data analysis. The paper here describes the various kinds of body area networks, the frequency bands used MICS and ISM,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Security in GSM Cellular Standard by Cryptographic Algorithms

    Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. GSM is most widely used cellular standard in the world. Mobile network is the shared media. When the media are shared, any...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Mehodology for Low Power Radio Frequency Design for Body Area Network

    The body area network forms an essential part of medical data analysis. The paper here describes the various kinds of body area networks, the frequency bands used MICS and ISM, the antennas used in the analytic nodes. The dual band antenna using the split ring resonator with a microstrip patch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    A Security Set of SMPP Protocol for SMS and Applications

    According to the security requirement of the Short Message Service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of Wireless Public Key Infrastructure (WPKI)....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    In Data Stream Association Rule Mining Research Problems: An Overview

    So many applications of data streams in the world where the people require association rule mining, like network intrusion detection, sensor network, financial monitoring, web click streams analysis and network traffic monitoring. Data streams are different from traditional static databases This thing raises new problems that need to be considered...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Bipartition of VLSI Circuits Using Simulated Annealing Technique

    The bi-partitioning of VLSI circuit is made using simulated annealing algorithm. The parameters used in annealing process are initial temperature, cooling rate and threshold (maximum number of iterations). The circuit is partitioned in two partitions and number of interconnections is find out between two partitions. The number of interconnection between...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Optimized Bandwidth of Rectangular Microstrip Antennas

    Microstrip antennas are well suited for wireless and mobile application due to their low-weight, low volume and low sensitivity to manufacturing tolerance. In this paper, the authors analyze the properties and design method of microstrip antenna and then design the microstrip antenna with MATLAB using cavity model method and simulate...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2011

    Study of Supply Chain Based on Agent and Multi-Behavior Agent Model

    In today's industrial context, competitiveness is closely associated to supply chain performance. Coordination between business units is essential to increase this performance, In order to produce and deliver products on time to customers/manufacturer at a competitive price. The most important task of the Supply Chain Management (SCM) is to reconfigure...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Routing Optimization Using Genetic Algorithm in Mobile Ad Hoc Network

    Mobile ad-hoc networks usually consist of mobile battery operated computing devices that communicate over the wireless medium and they have limited battery capacity. In this the author have proposed protocol provides secure and adaptive backup routing protocol for MANET. Genetic Algorithm (GA) is used to find the optimal path from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Review on the Effects of Reader/Tag Antenna Parameters on Read Range of UHF Passive RFID System

    The performance RFID system is dependent on many factors. Read Range is one factor which describes the performance of passive RFID system. Read range depends on the parameters of both the reader and the tag. It also depends on its application environment. This paper gives a brief introduction to an...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Design & Development of "Programmable Security Controller (PSC) (A Nanotechnology Device)" for WiMAX/WiFi Wireless Communication

    WiMAX (World-wide Interoperability for Microwave Access) will offer broadband wireless access at data rate of multiple mega bits per second to the end-user within a range of several kilometers. WiMAX is a complement to fixed, portable and mobile access for wireless communications. Application of nanotechnology is taking place in WiMAX/Wi-Fi...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    DHT Based Routing Protocols for MANETs: A Survey

    A Mobile Ad-hoc NETwork (MANET) is a temporary wireless network composed of mobile nodes, in which there is no infrastructure. The mobile nodes can dynamically exchange data among themselves. Because of these characteristics, path connecting source nodes with destination may be very unstable and go down at any time, making...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    MANET Internet Integration: A Survey Based Study

    Mobile ad hoc network being easy to deploy, self organized, flexible and independent of any pre-established infrastructure has become main component of research. But the research in the field of ad hoc network is restricted to stand-alone isolated networks. To widen the network coverage and application domain of ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Secure Authentication Scheme for Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors' studies show that there are performance and security problems with the existing authentication and keying mechanisms which are currently employed by wireless ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Capacity and Cell Range Assessment for Multitraffic User in Mobile WiMAX

    Radio technology advanced rapidly to enable transmission over larger distances with better quality, less power, smaller and cheaper devices. A cursory look into the history of wireless communications will reveal that every new wireless system improved on previous ones. The chance for WiMAX (IEEE -802.16e-2005 standard) to serve those who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Two Phase Energy Optimisation in Android Phones

    'Computing eats up energy' - and it's not a trivial matter. Processors are said to be the incipient of modern day computing era. Deploying the best processor is always marked by the one which leads to highest efficiency in energy saving without degrading system's performance. In this battle-ground of Excellency...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Dynamic Periphery Multicast Routing Protocol

    In this paper, the authors describe a new multicast routing protocol for mobile ad hoc wireless networks. The protocol establishes a source based mesh of nodes called with no static periphery or zone to distribute data for that source. The notion of zone or a flooding group is different the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Propagation Path Loss Measurements and Spline Interpolation for Missing Data

    Now-a-days the most of straight wired network systems are replaced by the wireless network systems. The authors know the main difference in between these two is the change from a fixed network location to mobile network location, i.e., an address is no longer a physical location and an address will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Handover Probability Analysis for B3G Heterogeneous Wireless Networks

    Wireless communications play an important role for providing global information access to the users. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks and also meets the challenges for the emerging...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Identifying Mischievous Users in Private Networks and Status Updating in Android Mobile

    Basically in anonymizing networks users privately access Internet services with the help of routers; the reason behind this is to hide the user's IP address. The disadvantage here is that users are taking advantage of this to deface websites. To overcome this problem administrator tries to block IP address of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    ERP IN E-Business World

    ERP is the acronym for Enterprise Resource Planning. ERP is a software application to improve the performance of organizations' resource planning, management control and operational control. ERP software is multi-module application software that integrates activities across functional departments, from product planning, parts purchasing, inventory control, product distribution, order tracking. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multi Criteria Based Multicast Routing for Wireless Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate whereas the others need the aid of intermediate nodes to route their packets. These networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Static Voltage Stability Indication in a Power System Using ANN

    The paper presents an approach for indication of static voltage stability conditions of a power system using Artificial Neural Network (ANN) as a correlator to correlate voltage stability index and bus loading index and corresponding bus voltage. The approach uses voltage stability indices and bus loading indices along with bus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Improved ODMRP With Motion Detection Approach

    Many network applications require transmitting the same single copy of data packets concurrently to many destinations. Applying the infrastructure-based multicast routing protocols in Mobile Ad hoc wireless NETworks (MANETs) is a big challenge. Factors that make Multicasting in ad hoc networks is more complex than in wired networks are host...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Interworking of 3G and 802.11 Networks: Present and the Future Ahead

    With the wide-spread deployment of 3G services in most of the countries and continuous increasing demand of Smartphones and iPhones, past has experienced a substantial increase in cellular data traffic. Since the licensed spectrum over which the 3G services are delivered is costly and scarce, mobile operators have already started...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multicast Genetic Zone Routing Protocol

    Multicast Zone Routing Protocol (MGRP) is the most promising and widely accepted and well proved hybrid routing protocol in Mobile Ad-hoc NETworks (MANETs) for its performance when compared in order to load balance the network, with table-driven demand protocols. This study is aimed to provide a set of available paths...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Mobile Crawler Using Aglets Technology Instead Web Crawlers

    To search Information on the Internet (World Wide Web) users make use of search engines. To search the user's information search engines make use of the Web Crawlers. Web crawlers has to index millions of web pages to make the searching efficient, also web crawlers has to visit the web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Pragmatic Study of Underwater Acoustic Sensor Network and Global Wireless Network

    Two third of the earth is covered with water and there has been a growing interest in monitoring underwater medium for scientific exploration and attack protection. Underwater sensor nodes will find application in ocean-graphic data collection, pollution monitoring, disaster prevention and tactical surveillance application. Underwater network consist of a variable...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Common Radio Resource Management for Heterogeneous Wireless Network

    A major challenge of the heterogeneous network is the Radio Resource Management (RRM) strategy. Common RRM (CRRM) is proposed to jointly manage radio resources among different Radio Access Technologies (RATs) in an optimized way. Heterogeneous wireless systems are envisaged as the integration and joint cooperative management of diverse radio access...

    Provided By International forum of researchers Students and Academician