International forum of researchers Students and Academician

Displaying 121-160 of 325 results

  • White Papers // Apr 2012

    A Review of Mobile Grid Computing and Its Architecture Classification

    The concepts of grid computing and mobile computing are the emerging trends in computer science and the advances are going in this filed hand in hand. The paper here discusses how the grid computing can be implemented in wireless mobile devices to work it as a single concept of mobile...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Call Admission Control Scheme in Wireless Mobile Network

    An important issue in the operation of a cellular telephone system is how to efficiently use the available band width to provide good service to as many customers as for civil. This application demand and allocation could lead to congestion if the network has to maintain such high resources for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey of Proactive Multicast Routing Protocols for Mobile Adhoc Network

    Mobile ad hoc network is a recently emerging branch of wireless communication technology. In such dynamic wireless network selection of the appropriate best efficient routing protocol among the large number of available protocols, as per the network requirement is a major challenge. This paper mainly has its focus on a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Knowledge Based Decision Support System for Standardization in Professional Education

    Professional Education is a Global Issue, every country in each continent is striving hard to earn as much professional growth possible. Particularly, in India the professional education has taken grip in last 10 odd years. But being a young fellow in to this new setting, there is a requirement of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Prioritizing Quality Requirements Based on Software Architecture Evaluation Feedback

    Quality attributes such as performance, reliability, and maintainability, are crucial for the success of any software system. The software architecture largely influences the quality properties a software system will exhibit. However, while quality requirements are defined in many companies mainly upfront, they are not systematically incorporated during development and thus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Extended SNMP Agent for Network Device Management

    The SNMP (Simple Network Management Protocol) provides a method of managing network hosts such as workstation or server computers, routers, bridges and hubs from a centrally-located computer running network management software. SNMP performs management services by using a distributed architecture of management system and agent. The SNMP agents which are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Consistent Data Access: An Effective Data Replication at Last Mile Services

    The up-coming last-mile services architecture assures to get the better ease of use and presentation of web services by making the servers available by distributing distributed globally. The main confront in such systems is data duplication and uniformity by which Last-Mile server code can control mutual data without deserving the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Protecting Privacy by Location Aggregation in Wireless Sensor Networks

    Preserving privacy of an individual while accessing location based information from Location Based Services (LBSs) is one of the most challenging tasks as the user unknowingly reveals the personal location in this process, where the location information can be tracked continuously and can be exploited. Sometimes it is required that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Importance and Benefits of Proposed ERP Maintenance Model

    Enterprise Resource Planning (ERP) systems are identified as enterprise wide software to integrate all the business processes for organizations. Enterprise Resource Planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Still Many organizations lack experience and expertise in managing ERP maintenance and upgrade effectively. One of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey on Privacy Preserving Data Mining

    The increasing use of data mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual's need and right to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Digital P2P Reputation System Using Self Certified Cryptographic Exchanges

    The main reason behind the success Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems is not a feasible solution for P2P networks to store peer reputation information. Though a centralized system does exist, it...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Analysis of a Hybrid Cipher Algorithm for Data Encryption

    Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Wireless Sensor Network & Security Attack Analysis

    The materialization of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning separately, and in many cases, without access to renewable energy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    The Ten Ingredients of Data Base Systems for Improving Performance and Their Review Leading to Research Problems

    In this paper, the authors survey, consolidate, and present the state of the art in database system and they try to specify the most important research possibilities in the data bases. The heart of their analysis is a survey on basic to advanced concepts and their relativity which will give...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Maintenance Management to Improve Productivity

    The role of maintenance is very important in the successful operations of continuous process plants like power, chemicals and fertilizer plants. Maintenance is a line function and it is based on systems developed to cover day to day breakdown maintenance, planned maintenance, preventive and predictive maintenance. Computers are integral part...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Performance Analysis on Channel Assignment Scheme in Mobile Networks

    This paper presents a general framework for a wide range of Call Admission Control (CAC) algorithms. For several CAC schemes, which are a subset of this general framework, an analytical performance evaluation is presented for a mobile wireless network. These CAC algorithms consider a variety of mechanisms to prioritize traffic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Routing Optimization Using Genetic Algorithm in Mobile Ad Hoc Network

    Mobile ad-hoc networks usually consist of mobile battery operated computing devices that communicate over the wireless medium and they have limited battery capacity. In this the author have proposed protocol provides secure and adaptive backup routing protocol for MANET. Genetic Algorithm (GA) is used to find the optimal path from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Review on the Effects of Reader/Tag Antenna Parameters on Read Range of UHF Passive RFID System

    The performance RFID system is dependent on many factors. Read Range is one factor which describes the performance of passive RFID system. Read range depends on the parameters of both the reader and the tag. It also depends on its application environment. This paper gives a brief introduction to an...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Design & Development of "Programmable Security Controller (PSC) (A Nanotechnology Device)" for WiMAX/WiFi Wireless Communication

    WiMAX (World-wide Interoperability for Microwave Access) will offer broadband wireless access at data rate of multiple mega bits per second to the end-user within a range of several kilometers. WiMAX is a complement to fixed, portable and mobile access for wireless communications. Application of nanotechnology is taking place in WiMAX/Wi-Fi...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    DHT Based Routing Protocols for MANETs: A Survey

    A Mobile Ad-hoc NETwork (MANET) is a temporary wireless network composed of mobile nodes, in which there is no infrastructure. The mobile nodes can dynamically exchange data among themselves. Because of these characteristics, path connecting source nodes with destination may be very unstable and go down at any time, making...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    MANET Internet Integration: A Survey Based Study

    Mobile ad hoc network being easy to deploy, self organized, flexible and independent of any pre-established infrastructure has become main component of research. But the research in the field of ad hoc network is restricted to stand-alone isolated networks. To widen the network coverage and application domain of ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Secure Authentication Scheme for Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors' studies show that there are performance and security problems with the existing authentication and keying mechanisms which are currently employed by wireless ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Capacity and Cell Range Assessment for Multitraffic User in Mobile WiMAX

    Radio technology advanced rapidly to enable transmission over larger distances with better quality, less power, smaller and cheaper devices. A cursory look into the history of wireless communications will reveal that every new wireless system improved on previous ones. The chance for WiMAX (IEEE -802.16e-2005 standard) to serve those who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Two Phase Energy Optimisation in Android Phones

    'Computing eats up energy' - and it's not a trivial matter. Processors are said to be the incipient of modern day computing era. Deploying the best processor is always marked by the one which leads to highest efficiency in energy saving without degrading system's performance. In this battle-ground of Excellency...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Dynamic Periphery Multicast Routing Protocol

    In this paper, the authors describe a new multicast routing protocol for mobile ad hoc wireless networks. The protocol establishes a source based mesh of nodes called with no static periphery or zone to distribute data for that source. The notion of zone or a flooding group is different the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Propagation Path Loss Measurements and Spline Interpolation for Missing Data

    Now-a-days the most of straight wired network systems are replaced by the wireless network systems. The authors know the main difference in between these two is the change from a fixed network location to mobile network location, i.e., an address is no longer a physical location and an address will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Handover Probability Analysis for B3G Heterogeneous Wireless Networks

    Wireless communications play an important role for providing global information access to the users. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks and also meets the challenges for the emerging...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Identifying Mischievous Users in Private Networks and Status Updating in Android Mobile

    Basically in anonymizing networks users privately access Internet services with the help of routers; the reason behind this is to hide the user's IP address. The disadvantage here is that users are taking advantage of this to deface websites. To overcome this problem administrator tries to block IP address of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    ERP IN E-Business World

    ERP is the acronym for Enterprise Resource Planning. ERP is a software application to improve the performance of organizations' resource planning, management control and operational control. ERP software is multi-module application software that integrates activities across functional departments, from product planning, parts purchasing, inventory control, product distribution, order tracking. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multi Criteria Based Multicast Routing for Wireless Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate whereas the others need the aid of intermediate nodes to route their packets. These networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Static Voltage Stability Indication in a Power System Using ANN

    The paper presents an approach for indication of static voltage stability conditions of a power system using Artificial Neural Network (ANN) as a correlator to correlate voltage stability index and bus loading index and corresponding bus voltage. The approach uses voltage stability indices and bus loading indices along with bus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Improved ODMRP With Motion Detection Approach

    Many network applications require transmitting the same single copy of data packets concurrently to many destinations. Applying the infrastructure-based multicast routing protocols in Mobile Ad hoc wireless NETworks (MANETs) is a big challenge. Factors that make Multicasting in ad hoc networks is more complex than in wired networks are host...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Interworking of 3G and 802.11 Networks: Present and the Future Ahead

    With the wide-spread deployment of 3G services in most of the countries and continuous increasing demand of Smartphones and iPhones, past has experienced a substantial increase in cellular data traffic. Since the licensed spectrum over which the 3G services are delivered is costly and scarce, mobile operators have already started...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multicast Genetic Zone Routing Protocol

    Multicast Zone Routing Protocol (MGRP) is the most promising and widely accepted and well proved hybrid routing protocol in Mobile Ad-hoc NETworks (MANETs) for its performance when compared in order to load balance the network, with table-driven demand protocols. This study is aimed to provide a set of available paths...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Mobile Crawler Using Aglets Technology Instead Web Crawlers

    To search Information on the Internet (World Wide Web) users make use of search engines. To search the user's information search engines make use of the Web Crawlers. Web crawlers has to index millions of web pages to make the searching efficient, also web crawlers has to visit the web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Pragmatic Study of Underwater Acoustic Sensor Network and Global Wireless Network

    Two third of the earth is covered with water and there has been a growing interest in monitoring underwater medium for scientific exploration and attack protection. Underwater sensor nodes will find application in ocean-graphic data collection, pollution monitoring, disaster prevention and tactical surveillance application. Underwater network consist of a variable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Based Wireless Sensor Network For Signal Classification

    The tremendous increase in the Wireless Sensor Network (WSN) in the last decade has increased the potential applications including environment monitoring, smart spaces, medical systems, and robotics exploration. Sensors integrated into structures, machinery, and the environment has led to fewer catastrophic failures, conservation of natural resources, improved manufacturing productivity, improved...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Spectral Entropy Based VAD Using Teager Energy Operator and HOS

    In this paper, the authors presents Voice Activity Detection (VAD) algorithm for detecting voice in noisy environments. The presented robust VAD utilizes the Spectral Entropy (SE) with Teager Energy Operator (TEO) to provide a better representation of formant information resulting in high performance of classification of speech/non-speech priori to entropy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Survey Report on Implementation of Optimized Cryptographic Algorithm

    Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Cryptographic algorithms are widely used in Internet Systems. Applications of cryptographic algorithms include credentials establishment i.e....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Proposed Architecture for Agent Communication Manager in Mobile Ad-hoc Network

    In this paper, the authors are going to introduce the proposed architecture for agent communication manager in MANETS. Here they are introducing a manager for agent communication that support the dynamic as well the static infrastructure according to the nature of the problem. The architecture proposed by them consists of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparative Analysis of Energy Consumption in Various Routing Protocol for Mobile Ad Hoc Network

    An ad-hoc network is the cooperative engagement of a collection of mobile hosts without the required intervention of any centralized access point. In this paper, the authors present an innovative design for the operation of such ad-hoc networks. The design of efficient routing protocols is a fundamental problem in a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Parallel Searching Algorithm on Hypercube Interconnection Network

    In the information age, the huge amount of data and information are exchanged which requires fast and efficient searching mechanisms for effective use of this information. There are various sequential searching algorithms to search an element in an unsorted array or sorted array of elements. A number of researchers have...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Round Robin CPU Scheduling Algorithm

    The main aim of this paper is to propose a new approach for round robin scheduling which helps to improve the performance of CPU in real time and time sharing operating system. Existing CPU scheduling algorithm cannot be implemented in real time operating system due to their high context switch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparison of Position Based Routing Protocol and Topology Based Routing Protocol in VANET

    The Vehicular Ad hoc NETwork (VANET) is an emerging new technology. Which will make the life easy VANET is one of the influencing areas for the improvement of Intelligent Transportation System (ITS) in order to provide safety and comfort to the road users. Besides safety applications VANET also provide comfort...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Survey of Black Hole Attack and Its Solutions in Mobile Adhoc Networks

    MANETs are infrastructure less network. It is difficult to design robust security solutions for MANETs. In MANETs, nodes themselves do routing and forwarding functions. Sometimes, nodes show selfish behavior and do not forward packets of other nodes. This is known as black hole attack. It results in reduction in network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Effective Synthesis of Health Science and Telemedicine by Using Body Area Network

    Body Area Networks (BANs) are wearable wireless sensor networks with a high potential for medical and sports applications. A body area network is formally defined as, "A communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Simulation Based Comparison of BER With Different Equalizers in Multipath Fading Channel

    The term equalization can be used to describe any signal processing operation that minimizes inter symbol interference. This paper shows comparison of bit error performance with different equalizers in multipath fading channel. Here, the authors discussed various types of algorithm used in equalization and the performance played by algorithm to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Analysis of Rectangular Micro Strip Antenna

    Micro strip antennas now a days had a wide application but unless analysis and optimization for rectangular micro strip antenna is made it is not possible to get high end performance from them. Several methods are there for to calculate the resonant frequency of a microstrip antenna using rectangular cavity...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Lightweight Soft-State Tracking Framework for Dense Mobile Ad Hoc Networks

    In a mobile ad hoc network, tracking protocols need to deal with - in addition to the mobility of the target - - the mobility of the intermediate nodes that maintain a track toward the target. To address this problem, the authors propose the MDQT (Mobility-enhanced Distributed Quad Tree) tracking...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    IPv6 Considered Harmful in Computer Network

    The investigation of the turing machine has developed e-business, and current trends suggest that the evaluation of lambda calculus will soon emerge. Given the current status of concurrent epistemologies, statisticians obviously desire the key unification of von Neumann machines and suffix trees, which embodies the significant principles of electrical engineering....

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Survey on Unicast and Multicast Routing Protocols for Mobile Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Intrusion Detection System in Ad-Hoc Network

    Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Approach for Efficient Delay Tolerant Networks Using Conditional Shortest Path Routing

    This paper deals with Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Improving Network Processing Technique in Internet Controlled Embedded Systems

    The RTCS Embedded Internet stack provides IP networking for the MQX platform. RTCS is provided with a rich assortment of TCP/IP networking application protocols and uses the MQX RTOS drivers for Ethernet or serial connectivity. RTCS is tightly integrated with the latest ColdFire and Power Architecture processors from Freescale and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Secure Usability Design System for User Authentication

    The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Performance Evaluation of Different Level Modulation Schemes for an Efficient Mobile WiMAX System in OFDM Under Rayleigh Fading and AWGN Channel

    Mobile WiMAX technology has become one of the fastest growing arenas of internet accessing in the people modern daily life. WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) to provide a worldwide interoperability for microwave access. IEEE 802.16e-2005 has been developed for mobile wireless communication which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Path Optimization CBET Technique Using for MANETS

    Efficient scheduling of processes on processors of a Network Of Workstations (NOW) is essential for good system performance. However, the design of such schedulers is challenging because of the complex interaction between several system and workload parameters. Co-scheduling, though desirable, is impractical for such a loosely coupled environment. Two operations,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Optimized Routing Algorithm for Congestion Control in Wireless Sensor Networks

    The previous routing approaches like Purely Random Propagation (PRP), Non-Repetitive purely Random Propagation (NRRP), Directed Random Propagation (DRP) perform the routing of packets without considering congestion might occur. When the intermediate nodes receive a huge amount of packets they directly drop the packets. The second problem is that there will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Route Handoff Using Channel Aware Routing Protocol in MANETs

    A Mobile Ad-hoc NETwork (MANETs) is a spontaneous network that can be established with no fixed infrastructure. Mobile ad-hoc networks are characterized by multi-hop wireless links and absence of any cellular infrastructure. Transmissions of packets are impaired by radio link fluctuations. Thus, in this paper an enhanced, channel aware routing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Integer Wavelet Based Steganographic Model by Selecting Variable Bit Length

    To enhance the embedding capacity of image steganography and provide an Imperceptible stego-image for human vision, an integer wavelet based data hiding with variable bit length substitution method employing secret-key is proposed in this paper. The new technique embeds binary bit stream in 8-bit color image (RGB channel). The technique...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Indoor Location Determination by Using RFIDs

    With the Growing usage of smart software that uses the location information, automatic location sensing became a necessity in everyday life. There is the Global Positioning System (GPS) which is a satellite based navigation system made up of a network of 24 satellites placed into orbit. GPS is widely used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Routing in Manets

    A Mobile Ad-hoc NETwork is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploying an infrastructure is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Online Strategy Proof Mechanism for Dynamic Spectrum Allocation in Cognitive Radios

    With the ever-increasing and dramatic development of wireless networks and mobile technologies the scarcity of spectrum in the spectrum market has been a natural phenomenon over the last few years. The challenge is taken up in the cognitive radio technologies to alleviate this scarcity by managing and efficiently redistributing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Survey of Security Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are becoming very attractive for both telecommunication and network industry. WSNs are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today Wireless Sensor Networks are broadly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Acquisition and Delivery in Traffic Monitoring VANETs Joint Optimization

    Vehicular Ad-hoc NETworks (VANETs) are envisaged to become a flexible platform for monitoring road traffic, which will gradually replace more cumbersome fixed sensor deployments. The efficacy of vehicle-assisted traffic monitoring systems depends on the freshness of traffic data that they can deliver to users, and the bandwidth used to do...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Remote Monitoring & Control of Wireless Sensor Network Using Smart Phone

    In this paper, the authors describe the design of a Wireless Sensor Network based on ZigBee technology. It is mainly used for collecting and transferring the various monitoring information about the coal mine underground with the help of WSN. Then the data will be analyzed and processed in the monitoring...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Embedded Based Finger Print Recognition System For Time and Attendance

    The main objective of this paper is to develop an embedded system, which will record the time and attendance of an employee in an organization and send monthly record of employee's work hours to organization using finger print recognition module which is interfaced with microcontroller. Whenever the employee enters the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    ARM Based Vehicle Tracking and Security Using GPS and GSM

    A low cost GPS and GSM based vehicle tracking system is developed using ARM processor for real time application. The main core of the system is an embedded hardware along with embedded C compiler. GPS gives the location of the vehicle and also embedded device communicates with GSM network which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    MANET Based Emergency Communication Module for Post Disaster Recovery

    In recent years, the world has experienced a number of catastrophic natural disasters such as earthquake, hurricane, typhoon, tsunami, etc. The victims trapped in the collapsed buildings and landslides will have a great chance of survival in case the rescue team reaches for help in a short period of time....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Verilog Implementation of Elliptic Curve Cryptosystem (ECC)

    Data Encryption is widely used to ensure security in open networks such as the internet with the fast development of cryptography research and computer technology. The capabilities of cryptosystems such as of RSA & Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on Elliptic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Data Mining Techniques for Crime/Terror Databases

    There have been several developments in data mining and the technology is being used for a wide variety of applications. It is also becoming a useful tool for detecting and preventing crime and terrorism. This paper will begin with an overview of the application field or the crime types with...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Data Collection in WSN Using Randomized Dispersive Routes

    In this paper, the authors define the problem to provide security to the network having intruders and reconstruction of original information using Shamir's secret sharing algorithm. The proposed system secure data collection in a Wireless Sensor Network with compromised nodes in order to circumvent or overcome the 'Black Holes'. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Distinct User Identification Method Using Web Log data

    With the Internet usage gaining popularity and the steady growth of users, the World Wide Web has become a huge repository of data and serves as an important platform for the dissemination of information. The users' accesses to Web sites are stored in Web server logs. However, the data stored...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Review on Data Security in Data Warehousing

    Data Warehouses are used for storing historic and current data and are used for creating trending reports for annual and quarterly comparisons for the enterprises. Data Warehouses are the most valuable assets which contains critical business data and information for the enterprises in today's world. Most of the existing data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Survey on Data Mining in Cloud Computing

    Data and information has a significant role on human activities, thus data sources are growing to be larger and distributed. But the main problem is not storing data; it is analyzing, mine, and process data for understanding it. Current era is of networking and communication; people are interested in keeping...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Approach for Enhancement of Data Security in Cloud Computing-A Review

    Cloud computing is an emerging trend which can transform information technology and the way it is used. The main issue is data security as it should not be a concern over the large data to be shared in cloud and hence not limit its use. This is a review of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Optimized Data Warehouse Model Through Pentaho ETL Tool

    Extraction-Transformation-Loading (ETL) tools are available for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In this paper, the authors have focus on how to build optimized data warehouse model through Pentaho ETL tool. Initially they have taken data set that is given...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Review on RFID Data Cleaning Problem Using Data Mining Tools

    The data stream produced by RFID reader is sometimes inaccurate. As a result there is a big load of unreliable data which is useless for higher level processing. Therefore the authors need to clean this unreliable data which they sometimes call dirty data. Dirty data appears in three reading errors...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Vehicular Traffic Surveillance Using Multiple Methodology

    Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages and applications. One of the applications of digital image processing is for traffic analysis. In literature survey found that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2013

    Monitoring & Detecting the Application Layer DDOS Attacks that Affects Popular Websites

    One of the major threats for the Internet's reliability and stability is Distributed Denial-Of-Service (DDOS) attack. The attackers are becoming more sophisticated and organized; also several high-profile attacks targeted prominent websites. These are the prime reasons that gained importance for the study of DDOS attack detection and prevention. It becomes...

    Provided By International forum of researchers Students and Academician