International forum of researchers Students and Academician

Displaying 121-160 of 388 results

  • White Papers // Jul 2012

    MANET Based Emergency Communication Module for Post Disaster Recovery

    In recent years, the world has experienced a number of catastrophic natural disasters such as earthquake, hurricane, typhoon, tsunami, etc. The victims trapped in the collapsed buildings and landslides will have a great chance of survival in case the rescue team reaches for help in a short period of time....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Link Failure Tolerance by Path Restoration

    Due to channel interference, dynamic obstacles and/or applications' bandwidth demands multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures. This results performance degradation in WMNs and require expensive, manual network management for their real-time recovery. Herewith the authors present an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Comparative Study for Quadruple Tank Process with Coefficient Diagram Method

    In this paper, a new decoupler method using Coefficient Diagram Method (CDM) for quadruple tank process is proposed. It consists of four inter connected water tanks and two pumps. The major problem in a multivariable process is that the loop interaction may arise and cause difficulty in feedback control design....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Connectivity-Based Localization Schema for Wireless Sensor Network

    In this paper, the author examines localization error will be minimal after adjusting the radio range of beacons' and error performance tradeoffs. Anchor based-range-free schema for Wireless Sensor Network. Localization algorithms are different in different network environments. His work is to find out an efficient localization algorithm for Wireless Sensor...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A CDMA Cellular Network Base Station Distributed Closed-Loop Power Control Algorithm Based on Sixteen-Iterations

    All users transmit on the same frequency and time and utilize the entire bandwidth in CDMA compared to TDMA or FDMA. Even though CDMA provides more capacity and better QoS, the capacity is affected by the near-far problem which degrades the performance of users far away from the BSs. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    On Dynamic Configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices

    The availability of unlicensed spectrum coupled with the increasing popularity of wireless communication has given rise to wide range of wireless technologies. The overwhelming success of mobile devices and wireless communications is stressing the need for the development of wireless mobile application services. Device mobility requires services adapting their behavior...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Hiding Text in Audio Cover with the High Capacity and Security Using Multiple LSBs

    Stenography is an art of embedding hidden data or secret messages over a public channel so third party cannot detect the presence of secret messages. In this stenography method of embedding textual information in an audio file, a proposed technique is first audio sampled and then appropriate bit of each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Architecture of Data Warehouse ETL Tools- Performing Efficient and Effective Way

    Data warehousing has been a buzz word in the industry since mid 90's, but it was not wide spread due to be complex timing and maintenance. Business and technologies are now wider and wider so in modern technologies users cannot think in any organization without data warehouse. Data warehouse helps...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Wi-MAX Security Enhancement and Solution for Authentication Against Man-in-the-Middle Attack

    The paper presents security enhancement of Worldwide Interoperability for Microwave Access (WiMAX) for authentication frame work in IEEE 802.16 against man-in-the-middle attack. This gives secure authentication of legitimate Mobile Station (MS) and protects man-in-the-middle attack. To prevent this kind of attack and to make the authentication more secure, a Hash-Random...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Stability of Feedback Based LNA Topologies for UWB Communication

    Since the U.S. Federal Communications Commission (FCC) approved the application of Ultra Wide-Band (UWB) technology for commercial use in early 2002, ranging from 3.1 to 10.6 GHz (bandwidth: 7.5 GHz), the implementation of a UWB system and its sub-blocks has been a challenge for Integrated Circuit (IC) designers. In this...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Gallium Nitride-Based RF Power Amplifiers for Future Wireless Communication Systems

    Radio Frequency (RF) High Power Amplifiers (PAs) received increasing attention as key components responsible for a sizable portion of base station cost (power loss and cooling equipment) in wireless communication systems. Thus, high power and high efficiency amplifiers with low power loss are critically needed. To meet these requirements, higher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Realization of the SISO Architecture for Downlink Data Channels of 3GPP-LTE Using PlanAhead Tool and Virtex-5 Device

    Long Term Evolution (LTE) of UMTS Terrestrial Radio Access and Radio Access Network is a Fourth Generation wireless broadband technology which is capable of providing backward compatibility with 2G and 3G technologies. As compared with other promises LTE is able to deliver high data rate and low latency with reduced...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Design of an Efficient Low Power 8- Bit Flash ADC

    Signals in real world are analog. Since analog signals can assume any value, noise is interpreted as being part of the original signal. Digital systems, on the other hand, can only understand two numbers, zero and one. Anything different from this is discarded. A novel design of flash Analog-to-Digital Converter...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    ARM Based Vehicle Tracking and Security Using GPS and GSM

    A low cost GPS and GSM based vehicle tracking system is developed using ARM processor for real time application. The main core of the system is an embedded hardware along with embedded C compiler. GPS gives the location of the vehicle and also embedded device communicates with GSM network which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Verilog Implementation of Elliptic Curve Cryptosystem (ECC)

    Data Encryption is widely used to ensure security in open networks such as the internet with the fast development of cryptography research and computer technology. The capabilities of cryptosystems such as of RSA & Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on Elliptic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Implementation of Software-Defined Radio Using Lab VIEW

    A software-defined radio consists of a programmable communication system where functional changes can be made by merely updating software. In this paper, a software-defined radio 4-QAM (Quadrature Amplitude Modulation) modem system is implemented in LabVIEW. LabVIEW is a widely used graphical programming environment which allows designing systems in an intuitive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Off-Line Signature Verification and Recognition

    Signatures are composed of special characters and flourishes and therefore most of the time they can be unreadable. Also intrapersonal variations and interpersonal differences make it necessary to analyze them as complete images and not as letters and words put together. As signatures are the primary mechanism both for authentication...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Comparability of PTS & SLM PAPR Reduction Techniques in MIMO-OFDM System

    This paper enhances SeLected Mapping (SLM) and Partial Transmit Sequence (PTS) which are known as PAPR reduction methods for OFDM. And comparison of both PTS and SLM technique discussed. Multicarrier systems suffer from a high Peak-to-Average power Ratio (PAR) of their transmit signal as large signal peaks lead to power...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Modified Approach to Multipath Routing Protocols in Mobile Adhoc Networks

    Mobile ad hoc networks are typically characterized by high mobility and frequent link failures. As a result, routing algorithms selecting a single path during route creation have to make frequent route discoveries resulting in decreased throughput and high end-to-end delay. Multipath routing approaches like DSR make use of pre-computed routes...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Performance Analysis of FTTH Gigabit Ethernet Passive Optical Network (GEPON) System With Triple Play Services

    In the paper performance of the FTTH Gigabit Ethernet Passive Optical Network (GEPON) system with triple play services such as video broadcast at 1550 nm and voice over IP and high speed internet at 1490 nm with 1:32 splitting is evaluated using FEC technique. By using the FEC (Forward Error...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Common Radio Resource Management for Heterogeneous Wireless Network

    A major challenge of the heterogeneous network is the Radio Resource Management (RRM) strategy. Common RRM (CRRM) is proposed to jointly manage radio resources among different Radio Access Technologies (RATs) in an optimized way. Heterogeneous wireless systems are envisaged as the integration and joint cooperative management of diverse radio access...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Building Embedded Systems Networked Applications Using Controller Area Network Protocol

    Controller-Area Network (CAN or CAN-bus) is a vehicle bus standard designed to allow microcontrollers and devices to communicate with each other within a vehicle without a host computer. It was designed specifically for automotive applications but is now also used in other areas. CAN is ideally suited to the many...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Malware Vulnerabilities in Mobile OS: Risk and Exploitation

    In this paper, the authors are presenting the malware practices in Mobile OS. Discussing the related work to find the risk and attack threats available for Mobile Operating System. A framework has been discussed which help in Malware Detection through rule based, Knowledge based system. As the scenario has changed,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Steganography on Android Based Smart Phones

    Steganography is an old technique to hide data into resources. In this paper, the authors have explained how this technique can be used in android based smart phone. The paper includes basics of image representation, limitations of Smartphones like android, other alternatives and implementation on android. There are some limitations...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    GI-FI (A New Wireless Technology)

    The paper presents the review about GI-FI which is a new wireless technology. GI-FI will help to push wireless communications to faster drive. For many years cables were used as a medium of communication or data transfer. Optical fibres played a dominant role for its higher bit rates and faster...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Clustered Caching Based Scheme for SOA to Improve Reliability, Scalability and Data Availability

    The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large number of loosely coupled services. While this has opened up new avenues for building large, complex applications, it has made the management of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Cloud Computing the Way Ahead

    Cloud computing is the latest technology through which a new dimension of computing is going to be unfolded. It has changed the way computing is done and is being seen by everyone including world's top computer experts and MNC's. It emphasizes more on the way of doing then how to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    GWT Javascript Complier Support for Building Debuggable and Desktop-Like Web Applications

    The Google Web Toolkit (GWT) is an open source framework that makes building rich Internet applications (high-performing, interactive, AJAX applications) easy for Java developers. Instead of using the HTML, DHTML, JavaScript language (which is powerful, but lacking in areas like modularity and testing features, making the development of large-scale systems...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Simple Network Adapter Simulation on EML Layer for Optics Management System

    Simple network adapter initially which acts as an interface between the transaction server and network elements communicates over the channel through TCPPDU. Presently the disadvantage being involved in TCPPDU is to maintain the channel contention, reservation of channel bandwidth. The disadvantage being involved is certain features, version of network elements...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Wireless Multi-Purpose in Intelligent Home Based on SMS and Email With the RFID Technology

    In this paper, the authors provide home appliance control, security and health care systems. The system is Short Message Service (SMS) and Email based Smart and Security with the Radio Frequency IDentification (RFID) technologies. The system uses Global System for Mobile communication technology (GSM) and Web thus providing ubiquitous access...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    MSOPS - Manage and Secure Optical Networks by Simulation of Network Elements

    During the development of a Network Management System (NMS), it is imperative to test the system with the actual Network Element (NE). However, this is not feasible, as the equipment may be unavailable during the development cycle or NE may have to be physically laid throughout the globe in order...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    IEEE 802.15.4 Based Embedded Wireless Monitoring and Recording of Environmental Parameters

    To create a wireless environmental parameters recording system that can benefit from the continuous advancements being made in embedded microcontroller and communications technologies. Architecture for continuous wireless environmental monitoring has been designed, fabricated, and tested. The system consists of Commercial-Off-The-Shelf (COTS) wireless-enabled module and components for communicating the temperature, humidity,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    An Improved-SPIN Protocol for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN) data transmission is one the major challenges and a number of routing protocols have been proposed to cope up with this problem by saving energy during transmission. Routing protocols that performs in-network aggregation are best suited for this purpose to yield energy saving data transmission....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Analysis the Performance of MANET Protocols by Varying the Number of Connections

    A Mobile Ad-Hoc NETwork (MANET) is self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. In such networks, nodes are able to move and synchronize with their neighbors. Due to mobility, connections in the network can change dynamically and...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Neighborhood Boundary Based Routing Protocol With Retransmit Delay for MANETs

    In MANETs, each node is equipped with a wireless transmitter and receiver and is free to move around in an arbitrary fashion. The self-configuration ability of MANETs makes them suitable for communication within groups of people through mobile devices. The route detection processes used in most on-demand routing Protocols, such...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    New Generation Networking Language-REBOL

    REBOL is an advanced interpreted language that lets the user access and controls the resources of the Internet with such ease that they might start thinking of the Internet as their own personal operating system. The user already familiar with how web browsers let their surf the Internet. With REBOL...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Ant Colony Based Novel Routing Protocol for MANET

    Mobile Ad-hoc NETworks (MANETs) are the only reasonable choice when there is no infrastructure wireless network or it is too expensive to build one as in remote areas. Routing is needed to find a path between the source and the destination and to forward the packets even if the destination...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Survey on Various Machine Learning Techniques to Detect and Classify DDoS Attacks

    The rigorousness of Distributed Denial of Service (DDoS) attack exhibit a wide range of security needs. Detection and classification of DDoS attacks has become a very challenging research field. Keeping this in mind and to overcome the DDoS attack, in this paper the authors investigates the machine learning techniques that...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Bluetooth Chat Over Android in Mobile Network

    Android is an operating system for mobile devices such as Smartphones and tablet computers. Android is the first complete, open, and free mobile platform. It is developed by the Open Handset Alliance led by Google. If there's one time when "Cheap and easy" is a benefit, it's with mobile development....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Survey on Dynamic Slicing Techniques for Object-Oriented Programs

    Program slicing is an effective approach to narrow the concern, to the relevant parts of a program. Researchers have proposed various techniques for program slicing since years. In the classification of program slicing, it is found that dynamic slices are smaller than static slices and can be used more efficiently...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Building Embedded Systems Networked Applications Using Controller Area Network Protocol

    Controller-Area Network (CAN or CAN-bus) is a vehicle bus standard designed to allow microcontrollers and devices to communicate with each other within a vehicle without a host computer. It was designed specifically for automotive applications but is now also used in other areas. CAN is ideally suited to the many...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Malware Vulnerabilities in Mobile OS: Risk and Exploitation

    In this paper, the authors are presenting the malware practices in Mobile OS. Discussing the related work to find the risk and attack threats available for Mobile Operating System. A framework has been discussed which help in Malware Detection through rule based, Knowledge based system. As the scenario has changed,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Steganography on Android Based Smart Phones

    Steganography is an old technique to hide data into resources. In this paper, the authors have explained how this technique can be used in android based smart phone. The paper includes basics of image representation, limitations of Smartphones like android, other alternatives and implementation on android. There are some limitations...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    GI-FI (A New Wireless Technology)

    The paper presents the review about GI-FI which is a new wireless technology. GI-FI will help to push wireless communications to faster drive. For many years cables were used as a medium of communication or data transfer. Optical fibres played a dominant role for its higher bit rates and faster...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Clustered Caching Based Scheme for SOA to Improve Reliability, Scalability and Data Availability

    The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large number of loosely coupled services. While this has opened up new avenues for building large, complex applications, it has made the management of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Cloud Computing the Way Ahead

    Cloud computing is the latest technology through which a new dimension of computing is going to be unfolded. It has changed the way computing is done and is being seen by everyone including world's top computer experts and MNC's. It emphasizes more on the way of doing then how to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    GWT Javascript Complier Support for Building Debuggable and Desktop-Like Web Applications

    The Google Web Toolkit (GWT) is an open source framework that makes building rich Internet applications (high-performing, interactive, AJAX applications) easy for Java developers. Instead of using the HTML, DHTML, JavaScript language (which is powerful, but lacking in areas like modularity and testing features, making the development of large-scale systems...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Simple Network Adapter Simulation on EML Layer for Optics Management System

    Simple network adapter initially which acts as an interface between the transaction server and network elements communicates over the channel through TCPPDU. Presently the disadvantage being involved in TCPPDU is to maintain the channel contention, reservation of channel bandwidth. The disadvantage being involved is certain features, version of network elements...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Wireless Multi-Purpose in Intelligent Home Based on SMS and Email With the RFID Technology

    In this paper, the authors provide home appliance control, security and health care systems. The system is Short Message Service (SMS) and Email based Smart and Security with the Radio Frequency IDentification (RFID) technologies. The system uses Global System for Mobile communication technology (GSM) and Web thus providing ubiquitous access...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    MSOPS - Manage and Secure Optical Networks by Simulation of Network Elements

    During the development of a Network Management System (NMS), it is imperative to test the system with the actual Network Element (NE). However, this is not feasible, as the equipment may be unavailable during the development cycle or NE may have to be physically laid throughout the globe in order...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    IEEE 802.15.4 Based Embedded Wireless Monitoring and Recording of Environmental Parameters

    To create a wireless environmental parameters recording system that can benefit from the continuous advancements being made in embedded microcontroller and communications technologies. Architecture for continuous wireless environmental monitoring has been designed, fabricated, and tested. The system consists of Commercial-Off-The-Shelf (COTS) wireless-enabled module and components for communicating the temperature, humidity,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    An Improved-SPIN Protocol for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN) data transmission is one the major challenges and a number of routing protocols have been proposed to cope up with this problem by saving energy during transmission. Routing protocols that performs in-network aggregation are best suited for this purpose to yield energy saving data transmission....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Analysis the Performance of MANET Protocols by Varying the Number of Connections

    A Mobile Ad-Hoc NETwork (MANET) is self-configuring network of mobile nodes connected by wireless links to form an arbitrary topology without the use of existing infrastructure. In such networks, nodes are able to move and synchronize with their neighbors. Due to mobility, connections in the network can change dynamically and...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Neighborhood Boundary Based Routing Protocol With Retransmit Delay for MANETs

    In MANETs, each node is equipped with a wireless transmitter and receiver and is free to move around in an arbitrary fashion. The self-configuration ability of MANETs makes them suitable for communication within groups of people through mobile devices. The route detection processes used in most on-demand routing Protocols, such...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    New Generation Networking Language-REBOL

    REBOL is an advanced interpreted language that lets the user access and controls the resources of the Internet with such ease that they might start thinking of the Internet as their own personal operating system. The user already familiar with how web browsers let their surf the Internet. With REBOL...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Ant Colony Based Novel Routing Protocol for MANET

    Mobile Ad-hoc NETworks (MANETs) are the only reasonable choice when there is no infrastructure wireless network or it is too expensive to build one as in remote areas. Routing is needed to find a path between the source and the destination and to forward the packets even if the destination...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Survey on Various Machine Learning Techniques to Detect and Classify DDoS Attacks

    The rigorousness of Distributed Denial of Service (DDoS) attack exhibit a wide range of security needs. Detection and classification of DDoS attacks has become a very challenging research field. Keeping this in mind and to overcome the DDoS attack, in this paper the authors investigates the machine learning techniques that...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Bluetooth Chat Over Android in Mobile Network

    Android is an operating system for mobile devices such as Smartphones and tablet computers. Android is the first complete, open, and free mobile platform. It is developed by the Open Handset Alliance led by Google. If there's one time when "Cheap and easy" is a benefit, it's with mobile development....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Survey on Dynamic Slicing Techniques for Object-Oriented Programs

    Program slicing is an effective approach to narrow the concern, to the relevant parts of a program. Researchers have proposed various techniques for program slicing since years. In the classification of program slicing, it is found that dynamic slices are smaller than static slices and can be used more efficiently...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Securing OTP Transaction Using Mutual Authentication and Encryption

    Secure authentication schemes between an authentication server and users are required to avoid many risks on the Internet. A new one time password scheme is described which is secure against eavesdropping, server database compromise and generate Static key for encryption at the same time. That scheme is at least as...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Survey on Graphical Methods for Test Case Generation

    Goal of a simple test case generation is to find an input that will drive execution of a program along a particular path in its flow graph. Several researchers have proposed different techniques to generate test cases and in most of the approaches proposed so far, either the source code...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Novel Approach for Securing User Transactions Using Two Factor Mobile Authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. During authentication, credentials presented by an individual are validated and associated with the person's identity. This binding between credentials and identity is typically done for the purpose of granting...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Short Study of Wireless Sensor Networks in Healthcare Applications

    Applications of Wireless Sensor Networks (WSN) are diverse. They range from home security to military surveillance. Advances in technology and high-end protocols developed for WSNs have increased the popularity of WSN in all major areas of application. One such application is healthcare monitoring. WSNs today are widely being used in...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Trust Management in Mobile Ad-Hoc Networks Using a Scalable Maturity-Based Model

    The trust management in mobile ad hoc network is for sending the message from source node to destination node in ad hoc networks. This sending process is based on trusting its neighbor node. The trust is based on previous individual experiences and on the recommendations of others. The Recommendation Exchange...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Clustering Technique for Load Balancing in MANETs

    A Mobile Ad hoc NETworks (MANETs) are a collection of mobile nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure and do not require any central administration. These mobile nodes will act as both node as well as routers. While routing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Interoperability Between Wireless Networks Using FPGA Based Advanced Gateway

    In a communication network, a network node equipped for interoperability with another network can use different protocols and frame formats. So, there is a need for protocol conversion to provide a match between the source and destination networks. To satisfy the requirements of protocol conversion and thus to provide interoperability,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Ensuring QOS in WiMAX Networks

    Quality of Service (QoS) is a key metric for bandwidth demanding applications in WiMAX (IEEE 802.16 standard) networks. It is achieved through bandwidth reservation for each application. Existing solution use priority-based scheduling algorithm to ensure the QoS guaranteed services. Although, it allows the Subscriber Station (SS) to adjust the reserved...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Implementation of Blake and RSA in a Fast Authentication Protocol for Wireless Mesh Networks on FPGA

    Encryption techniques like BLAKE and RSA is implemented in a fast authentication protocol based on tickets, which supports fast handoff mainly in real time applications like VoIP in Wireless Mesh Networks (802.11s). In this authentication protocol, the central server is not involved during authentication thus avoiding multiple hop transmissions. The...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Security Threats on Different Layers of Mobile Ad Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. The ad-hoc networks are a new wireless networking paradigm for...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    On Building Intelligence for Securing Communication Between the Tags and the Mobile Devices

    Tag is a small embedded system meant for identification of an object to which it is attached and in addition the TAGS can be made to be intelligent such that they can identify its own location, alert the master about an event occurring in its vicinity, sensing tampering with its...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Unified Approach for Outlier Detection Using Change Point for Intrusion Detection

    The number of computers connected to a network is increasing and Network Intrusion Detection System (NIDS) is one of the essential to an organization. The challenge here is to react quickly to different events with high detection rates and low false positives for real time traffic. Current research is in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Networking Protocols : Bluetooth Architecture

    Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth SIG. Additional protocols have been adopted from other standards bodies. This paper gives an overview of the core protocols and those adopted protocols that are widely used. The Bluetooth protocol stack is split in two...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Design and Implementation of Artificial Neural Network Architecture for MANET on FPGA Platform

    This paper presents and FPGA implementation of Artificial Neural Network (ANN) is applied in Wireless Ad-Hoc NETwork (WANET) for the performance optimization of Routing protocol and its Hardware implementation using Field Programmable Gate Arrays (FPGA). Artificial Neural Network is designed using MATLAB and its digital architecture implementation is described using...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Software Architecture for Implementing Efficient Power Management Techniques Within Intelligent TAGS

    Power consumption has become a serious issue in the development of remote mobile devices such as intelligent tags where charging and recharging of the battery cannot be done frequently. Longevity of the battery has to be increased by power saving. Many existing techniques address the issue of power management in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Study on Traceability and Human Factors in Agile Practices to Improve Software Quality

    The most noticeable change to software process thinking in the last few years has been the appearance of the word 'Agile'. Agile software development methods were invented to minimize the risk of developing low quality software systems with rigid process-based methods. They impose as little overhead as possible in order...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Software Operational Profile Development Using Use Case Model

    One of the important ways of measuring software reliability is through operational profile of the software. Operational profile is used to guide the development and the testing process. Operational profile testing has effective and practical importance in software testing, since it improves the reliability and speeds up the software development....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Cloud E-Learning: A New Virtuous Business Archetype for E-Learning

    Now-a-day, most of predominant education system are becoming not being suitable for necessities of social improvement and educational development and not being able to catch up with the changes of learning demand in time, thus computer networks have brought opportunities for it. In conventional web based E-learning approach, system assembly...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Customizing and Porting of UClinux on Reconfigurable SoC

    Today's reconfigurable hardware devices have huge densities and are partially reconfigurable, allowing for the configuration and execution of hardware tasks in a true multitasking manner. This makes reconfigurable platforms an ideal target for many modern embedded systems that combine high computation demands with dynamic task sets. Such an operating system...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    FPGA and ASIC Implementation of Vedic Multiplier

    The ever increasing demand in enhancing the ability of processors to handle the complex and challenging processes has resulted in the integration of a number of processor cores into one chip. Still the load on the processor is not less in generic system. This load is reduced by supplementing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey of Proactive Multicast Routing Protocols for Mobile Adhoc Network

    Mobile ad hoc network is a recently emerging branch of wireless communication technology. In such dynamic wireless network selection of the appropriate best efficient routing protocol among the large number of available protocols, as per the network requirement is a major challenge. This paper mainly has its focus on a...

    Provided By International forum of researchers Students and Academician