International forum of researchers Students and Academician

Displaying 161-200 of 577 results

  • White Papers // Nov 2013

    EAP-Based Security Level and Three-Tier Packet Scheduling for Real-Time Wireless Networks

    Real-time wireless network requires high security level to assure confidentiality of information stored in packages delivered through wireless links. Most of the scheduling algorithms were concentrated on scheduling of the packets on real-time and the security is not concentrated. The authors remedy this problem by proposing a novel Security Level...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Random Walked Based Intrusion Detection System in MANET

    MANET is a Mobile Ad hoc NETwork in which multi-hop communication takes place. It is capable of working without any fixed infrastructure hence it is also called as infrastructure-less network. As it is infrastructure-less, nodes are free to move from one place to another. Hence, network topology changes dynamically. These...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Design and Implementation of Inter-Infrastructure and Vehicle Communication for Traffic Information Sharing

    Establishment of Vehicular Ad-hoc NETwork (VANET) is most demanding in smart traffic management system. By sharing the information between traffic system, road side unit and vehicles research can create vehicular network. Automatic detection of road signs has recently received attention from the computer vision research community. The main objective of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    On Enhancing the Performance of Capacity of Ad Hoc Wireless Networks Using Directional Antennas

    The capacity of ad hoc wireless networks is constrained by the interference between concurrent transmissions from neighboring nodes. With Omni-directional antennas, while two nodes are communicating using a given channel, MAC protocols such as IEEE 802.11 require all other nodes in the vicinity to stay silent. The capacity of an...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Re-Shuffling Packet Attack on TCP Based MANET

    A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, the authors present and analyze the effects of re-shuffling attack on TCP based mobile ad-hoc networks named as packet...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Key Distribution in Wireless Sensor Networks Using Quantum Cryptography

    Quantum Cryptography (QC) uses a property of laws of quantum mechanics to generate a random key for secure communication. To use QC in Wireless Sensor Networks (WSN) are very challenging task. In order to make secure communications around WSN, communication between sensor nodes and base station to sensor node should...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    A Dynamic Session Key Generation Method to Secure Data Routing in Heterogeneous Sensor Networks

    In recent era, Wireless Sensor Networks (WSNs) are playing a vital role in communication world. WSNs are placed in hostile environments where many critical aspects are to be considered-energy efficiency, robustness, performance and lifetime of the network. WSNs with homogeneous sensors will not attain a great performance due to their...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Event-Driven Data Dissemination in VANET Using ADEM Algorithm

    VANET integrates components of Wi-Fi, Blue-tooth and other mobile connectivity protocols to facilitate data transfer between cars and roadside equipment and automobile traffic. Immediate benefits of VANETs are preventing accidents and avoiding traffic jam. If a car spots a dangerous road situation, such as an accident, it transmits the information...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Delay Reduction by Using Shortest Path for Critical Event in WSN

    In Wireless Sensor Network (WSN), for critical event only less number of packets is transmitted. But for critical event more number of packets wants to be transmitting. So, sleep scheduling method used to increase the network lifetime. When critical event occurs, an alarm message is quickly transmitted to centre node....

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Energy Efficient Information Transportation in Multi-Hop Wireless Network and Link Protection Using Information Encoding Technique

    Link failure is one of the major issues in both wireless as well as wired network. In networks the link failure may be occurred due to a loss of energy in nodes, congestion and power loss in nodes. There are many techniques that are used for protection against the link...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Data Interleaving Technique: A Novel Approach for Speech Transmission Through Adaptive Multi-Rate Codec

    WB-AMR effectively doubles the audio bandwidth which will definitely enhance fidelity of speech and audio quality in multimedia content and the users will be benefited from enhanced clarity and intelligibility. This paper suggests the significance of data interleaving technique for speech transmission through AMR (NB & WB) codec that can...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Data Forfeiture Forbidding for Multihop Wireless Broadcast Routing in VANET

    Vehicular Ad hoc NETwork (VANET) is a subclass of Mobile Ad hoc NETwork (MANET) where vehicles are simulated as mobile nodes. Multi-hop wireless broadcast protocols used to broadcast packets in geographically bounded region. The system deal with Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol which performs well on using distance...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Network Intrusion Detection System-A Study in Cloud Computing Environment

    Cloud computing is one of electrifying technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for resources. Advances in networking technology and increase in the need for computing resources have prompted many organizations to outsource their computing needs. Cloud computing can be viewed...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Reputation Based and Trust Based Model in VANET

    Vehicle Ad hoc NETwork (VANET) is a special case of mobile ad hoc network, in which vehicle nodes allow to broadcast the information related to the road conditions such as traffic congestion, accident, weather conditions etc., This information is very useful to nearby vehicular nodes, which may increase the road...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    Detection of Misbehaving Nodes in Mobile Ad Hoc Network

    A Mobile Ad hoc NETwork (MANET) is an independent system of mobile routers attached by wireless links. In MANETs protecting a network from malicious attacks is an important and challenging issue. In this paper, a new mechanism has been proposed to detect and defend the network against such attack from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    A Survey Report On Security In Communication Network

    Network security is providing protection at the boundaries of an organization by keeping out intruders such as hackers. A \"Network\" has been defined as any set of interlinking lines resembling a net. For example, a network of roads, an interconnected system, a network of alliances. Simply a computer network is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2013

    A Study of Safety Systems and Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is a developing technology and has extraordinary potential to be utilized in basic circumstances like theaters of operations and business applications, for example, building, movement observation, environment observing and smart homes and numerous more situations. One of the major challenges wireless sensor networks face today is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2013

    Transformer Fault Diagnosis Using Self Organizing Feature Map Neural Network

    Transformer fault diagnosis is an important issue related to condition assessment of a device. In this paper, the incipient fault diagnosis of power transformer using unsupervised learning approach is presented. Self Organizing Feature Map Neural Network (SOFMNN) having the inherent capability to learn without presenting the targets is employed for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2013

    Application of Pseudo Inverse Matrix for Retrieving Data Securely

    In today's era data represent an important asset for companies and organizations. These data are worth millions of dollars, and organizations have to take great care controlling access to the data, with respect to both internal users and external users. The advantages of database-as-a-service are cost savings and service benefits...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2013

    Eminent Practices for Scalable Cloud Applications Enhancement

    Among the persistent expansion of societal networks, diverse additional online communities, and online media, website consumers' frequency was became dynamic and unpredictable as flash crowd and viral processes make unknown number of consumers to sites which were very little previously. Application developers and system designers will face many new and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2013

    DDoS Attack Detection using Different Datamining Techniques

    In security infrastructure, the unauthorized user detection system plays an important role. Denial of Service attack (DoS) brings a very serious threat to send to the stability of the Internet. Here the authors analyze the DoS attack detection methods are mostly focused on data mining techniques. Some DoS attacks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Large Scale Reliable Storage Systems

    The available fault-tolerant storage systems either assume a static set of replicas, or have limitations in how they handle reconfigurations. This can be problematic in large-scale systems where system membership is likely to change during the system lifetime. In this paper, the authors present a better solution for dynamically changing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Review on Mitigating Data Theft Attacks in the Fog Computing

    The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively scalable, efficient, agile, reliable and secure. The telecommunications networks have for many years, Demonstrated their ability to reliably enable network (voice) services creation, assurance...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Preserving Integrity of Data and Public Auditing for Data Storage Security in Cloud Computing Using Effective TPA

    Cloud computing is an internet based computing which enables sharing of services. Many users place their data in the cloud, so correctness of data and security is a prime concern. This paper studies the problem of ensuring the integrity and security of data storage in cloud computing. Security in cloud...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    An Implementation on 8x8 Vedic Multiplier Using Vedic Mathematics with High Speed Performance

    A high speed processor depends greatly on the multiplier as it is one of the key hardware blocks in most Digital Signal Processing (DSP) systems as well as in general processors. This paper presents a high speed 8x8 bit Vedic multiplier architecture which is quite different from the conventional method...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Developing Method for Mining of Knowledge For Customer Relationship Management

    Data mining is process of extracting or mining of knowledge from huge quantity of data Modern companies and organizations are efficiently implementing a CRM strategy for managing a company interactions and relationships with customers. CRM systems have been developed and designed to support the areas of marketing, service process and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Ontology Model for Ranking Techniques by Quality Reference for Domain-Specific Search

    Data mining is used to extract valid, previously unknown, and easily interpretable information from large data sets. As a model for knowledge description and formalization, ontology's are widely used to represent ranking techniques in personalized information gathering for the domain specific search. However, when representing Ranking Information, many models have...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Data Mining Application in Telecommunication: Fraud Detection

    Data mining is used in many areas to extract useful information from the cluster of data. There are different steps included in data mining process which are stated as follows: gathering data, selecting an algorithm, regression. By following these steps one can extract the useful information from the heap of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Survey of Algorithms for Sentence Extraction & Text Summarization

    World is observing an explosion of unstructured data today, a significant part of it, is in text form. One of the most effective text analytics techniques is extraction of keywords. Keywords provide information to obtain the summary of a document and they help in correlating documents. The main challenge is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Multicast Routing Protocols in MANET: A Performance Comparison Study

    A MANET is an autonomous system of mobile routers connected by wireless links. These routers are free to move randomly and organize themselves arbitrarily; thus, the networks wireless topology may change rapidly and unpredictably. Routing is an essential component of communication networks, which defines act of moving information from source...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Formal Verification of Energy Saving Techniques in Wireless Sensor Network (FVOEST)

    Routing in wireless sensor networks is different from routing in ad-hoc networks as nodes are randomly deployed. There are three types of routing in the WSNs: flat, hierarchical and location based routing. The paper discusses the problem in one of the existing routing protocol in hierarchical routing and suggests an...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Packet Reordering and Forced Delaying Based Attacks on TCP Based Mobile Ad-Hoc Networks

    A mobile ad hoc network is much more assailable to attacks than a wired network due to its limited physical security, high mobility and lack of centralized administration. In this paper, the authors present and analyze the effects of two different kinds of attacks on TCP based mobile ad-hoc networks...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Review Paper for Mean Node Detection and Correction in Wireless Sensor Network

    In Wireless Sensor Network (WSN) some of the nodes do not take part in forwarding packets to other nodes to conserve their resources such as energy, bandwidth and power. The nodes which act selfishly to conserve their resources are called selfish nodes. The selfish nodes are engaged to reduce data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Implementation of Routing Algorithm Based on ACO for Improvement of Adaptive Routing Using Fuzzy Logic in MANET

    In this paper, the author's measure performance matrix of various routing protocols based on ant routing in Mobile Ad hoc NETwork (MANET), inspired by ant colony optimization and enhanced by fuzzy logic technique as failure management. In Ant based route discovery, the transmission delay of each link, processing delay at...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Localization for Wireless Sensor Networks In 2-D Environment

    A wireless sensor network consists of distributed sensors to monitor physical or environmental conditions. In addition to one or more sensors, each node in a sensor network is equipped with a radio transceiver and other wireless communications device. A sensor network constitutes a wireless ad-hoc network, meaning that each sensor...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Enhancement in the Clustering Technique of the Classical Routing Protocol LEACH

    In this paper, the authors discuss about Wireless Sensor Network (WSN) that are widely used now-a-days in various fields to monitor some activities or to control some machinery such that no hazard take place. In this paper, first Wireless Sensor Network (WSN) and their working has been discussed. After that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Congestion Control in Mobile Ad Hoc Network

    In Mobile Ad hoc NETworks (MANETs) obstruction occurs due to the packet loss and it can be successfully reduced by involving congestion control scheme which includes routing algorithm and a flow control at the network layer. To maintain and allocate network resources effectively and fairly among a collection of users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    OVSF Code Blocking Problems, Solutions and Efficiency of NOVSF Codes

    CDMA is the access technique adopted in the third generation wireless system. In this technique, all users share the same bandwidth simultaneously but with different codes. This sharing generates interferences that can reduce the overall throughput of the WCDMA network when using a weak code allocation algorithm. WCDMA uses OVSF...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Throughput Improvement on Wireless Ad Hoc Networks Using Multi-Channel Medium Access Control

    Despite of recent advances in Wireless Local Area Network (WLAN) technologies, today's WLANs still cannot offer the same data rates as their wired counterparts. The throughput problem is further aggravated in multi-hop wireless environments due to collisions and interference caused by multi-hop routing. Because all current IEEE 802.11 PHYsical (PHY)...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2013

    Secure Identification of Fellow Nodes in MANET Using MSND

    Neighbor discovery is an important part of many protocols for wireless ad hoc networks, including localization and routing. When neighbor discovery fails, communications and protocols performance decline. In networks affected by relay attacks, also known as wormholes, the failure may be more restrained. The wormholes deny or degrade communications. In...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Increase Sensor Network Tenure by Captive Genetic Algorithm Method

    In sensor networks the nodes have limited energy, so it is critical to the save the energy of the nodes and thus the overall energy consumption of the network. This is necessary to increase the tenure of the entire network. In this paper the genetic algorithm and simulated annealing algorithms...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Fault Tolerance and Retrieval in MPLS Network

    Multi Protocol Label Switching (MPLS) is an evolving network technology that has been used to provide Traffic Engineering and high speed networking. Uninterrupted transmission in case of failure is a major concern in MPLS based networks. The path protection is an effective method for uninterrupted transmission. Existing approaches towards the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Review of Mobile Grid Computing and Its Architecture Classification

    The concepts of grid computing and mobile computing are the emerging trends in computer science and the advances are going in this filed hand in hand. The paper here discusses how the grid computing can be implemented in wireless mobile devices to work it as a single concept of mobile...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Twin Cloud Concept to Speed Up the PC During Virus Scan

    Twin Cloud concept promises a more cost effective and fast technology to scan data on the user PC. Existing approaches for scanning of data are either based on a signature-based technique, or based on emulation technique or combination of these techniques. The signature-based technique is very time consuming due to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Face Recognition From Video Image

    Face recognition technology analyze the unique shape, pattern and positioning of the facial features. Face recognition is very complex technology and is largely software based. This biometric methodology establishes the analysis framework with tailored algorithms for each type of biometric device. Face recognition starts with a picture, attempting to find...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Document Analysis Based on Text Mining (TRIZ)

    Documents contain important technical knowledge and research results. They have high quality information to inspire designers in product development. However, they are lengthy and have much noisy results such that it takes a lot of human efforts for analysis. And due to the fact that hidden and unanticipated information plays...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    A Divisible and Transferable Digital Cash Protocol

    Digital cash is an electronic payment system which enables a secure off-line transaction without revealing the payer's identity. In this paper, the authors present a k-term extension of the brands digital cash protocol which uses a simple and efficient verifiable secret sharing scheme for the implementation of k-term digital coins....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    A Novel Technique for Protection of TCSC Compensated Transmission Line

    This paper describes the wavelet based protection of series compensated transmission line. The performance of digital distance relay is affected whenever the fault occurred on the Transmission line which is Compensated with Series Compensation (TCSC) device, whenever the authors use conventional relaying algorithm due to the reach characteristics of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Analyzing Mobile Ad-Hoc Routing Protocols DSDV and AODV

    A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. Wireless mobile ad-hoc networks are characterized as networks without any physical connections. The widely accepted existing routing protocols designed to accommodate the need of such self-organized networks do not...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Intelligent Web Mining for Business Applications

    Web mining is an interesting area of research in information technology; so many business applications have emerged from web searching to web mining. With the advent of the World Wide Web, many business applications that utilize data and text techniques to extract useful business information on the Web have evolved...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Emission and Economic Dispatch Problem by Particle Swarm Optimization

    The environmentally constrained economic dispatch problem is a multi-objective nonlinear optimization problem with constraints. Until recently, this problem has been addressed by considering economic and emission objectives separately or as a weighted sum of both objectives. This paper presents a general formulation of the Combined Economic and Emission Dispatch (CEED)...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Improvement in Spectrum Sensing by Locally Optimal Detection Technique in Cognitive Radio

    Spectrum sensing is one of the enabling functionalities for cognitive radio systems to operate in the spectrum white space. To protect the primary incumbent users from interference, the cognitive radio is required to detect incumbent signals at very low Signal-to-Noise Ratio (SNR). In this paper a study of Locally Optimal...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Data Preserving for Data Publishing: For Two Sensitive Attributes

    The sensitive attribute such as social security number, disease by some organization should contain privacy in data publishing. Data holders can remove some attributes to gain privacy but other attributes which are in published data can lead to reveal privacy to adversary. So several methods such as K-anonymity, L-diversity, T-closeness...

    Provided By International forum of researchers Students and Academician

  • White Papers // Mar 2011

    Analysis of Energy Efficient End to End Delay for Wireless Sensor Network

    Reducing the energy consumption and increasing the lifetime is the major concern in Wireless Sensor Network (WSN). In most event driven surveillance applications, the end to end delay should also be minimized. In WSN most of the energy is consumed when sensor nodes are on and waiting for an events....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Node Based Radio Network Planning

    An efficient allocation of radio network planning is essential for ensuring good performance of cellular networks, given the limited spectrum available to meet the growth of demand. Previous work on analogue and second generation mobile communications has led to several channel allocation scheme and propagation model based on radio network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2011

    Issues in MWiMax Handover

    Recent research in WiMax handover delay has been strongly influenced by new developments in handover techniques. This paper presents a literature survey of various handover techniques in MWiMax till date which compares their performance in terms of their handover delay and QOS. This paper provides fast handover scanning scheme, enhanced...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Location Based Service: A Case Study Location Based Messenger

    This paper aims at location based messenger. The concept described here helps tracking the people with respect to their location and also the users who are in the same cell area are able to chat. Initially the user has to register with the service to avail this facility. One who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Joint Source Channel Coding for Reliable Video Transmission Over an AWGN Channel

    In this paper, a Joint Source Channel Coding (JSCC) video communication system is presented. The goal of JSCC is to distribute the total fixed bit rate to source coder and channel coder so that the end to end distortion is minimized. Due to development of DCT, Motion Estimation, Compensation and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    An Efficient Network Readiness Assessment Agent to Deploy Various Media Rich Applications

    Video is a powerful business tool. Various organizations make use of video applications for their business purposes. Applications which use video as one of media is called media rich applications. Media rich applications are highly interactive applications which require real time transfer of data with no delay or packet loss....

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Implementation of Security in Zone Routing in Mobile Ad-Hoc Networks Using SZRP

    This paper focuses on routing approaches in mobile ad hoc networks from the security viewpoint. In this paper, the authors analyze the threats against ad-hoc routing protocols and presented the requirements that need to be addressed for secure routing. Existing secure routing protocols for mobile ad hoc networks are either...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Performance Analysis of QoS Based Multimedia Real-Time Protocol

    Many multimedia applications require guaranteed Quality of Service (QoS) in communication networks. Typically, the QoS includes bandwidth, delay and delay jitter. This paper presents a real-time protocol to support multimedia communications in which the Connections are established with efficient resource reservation and proper admission control. During data transmission, the rate,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Dual Loop Layout Design of Backhaul Link for CDMA Cellular Communication System in Border Areas

    To exploit the advantages of cellular communication system which provides high mobility, quick connectivity and easier to carry being light weight? Hence the cellular communication system is very useful for the defence forces deployed all along the border. CDMA based cellular communication system has inherent security. Hence, it is preferred...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    A Tour to Detect Dishonesty on UNIX Shell Script Programming Assignment

    Plagiarism in the sense of "Theft of intellectual property" has been around for as long as humans have produced work of art and research. However, easy access to the Web, large databases, and telecommunication in general, has turned plagiarism into a serious problem for educational institutions. "Plagiarism attacks the fundamental...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Next Generation Services: Mobile Cloud Computing

    Mobile Cloud computing is widely accepted as a concept that can significantly improve the user experience when accessing mobile services. In cloud computing the computing resources such as processor, memory, and storage are not physically present at the users' location. Instead, the computing resources are owned and managed by a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Low Power Radio Frequency Design for Body Area Network

    Today in this world of medical computing, health monitoring equipments have form an integral part of the biomedical engineering field. The body area network forms an essential part of medical data analysis. The paper here describes the various kinds of body area networks, the frequency bands used MICS and ISM,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Security in GSM Cellular Standard by Cryptographic Algorithms

    Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. GSM is most widely used cellular standard in the world. Mobile network is the shared media. When the media are shared, any...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2011

    Mehodology for Low Power Radio Frequency Design for Body Area Network

    The body area network forms an essential part of medical data analysis. The paper here describes the various kinds of body area networks, the frequency bands used MICS and ISM, the antennas used in the analytic nodes. The dual band antenna using the split ring resonator with a microstrip patch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Performance Evaluation of Elliptic Curve Cryptosystem and Its Application

    ECC is a public key cryptosystem similar to RSA but it is based on elliptic curves. ECC are described with setting of the multiplicative group5 of the integers modulo a prime p. Such system can be modified to work in the group of points on an elliptic curve6. Further Diffe-Hellman...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Comparison of Propagation Path Loss Models in Outdoor Environment at 900MHz

    Wireless system has been active area of research in recent times. Generally Path loss models are used for predicting the losses in environment depending upon the different types of terrain. These models provide the different result in different area. In this paper, the authors compare different path loss models by...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Design and Development of Error Tracking and Debugging Tool in Android Platform

    Test automation in various mobile platforms is becoming a need. There are currently available tools in the market that cater to support mobile phone, web and desktop applications on various platforms. These tools are available at a cost by prominent vendors in the industry. The aim of this paper is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Optimized and Energy Efficient Multicast Routing Algorithm for Wireless Mobile Ad Hoc Networks Using Genetic Algorithm Approach

    In ad hoc networks, mobile node battery energy is finite and represents one of the greatest constraints for designing multicast routing protocols. In regards to the battery lifetime limitation in supporting multicast routing, some studies have investigated a power saving network layer. These proposed methods have always considered several techniques...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Key Exchange Protocol for Mobile Authentication

    In this paper, the authors present an overview of four protocols based on mutual authentication and key exchange. Each of the protocol has their own way of exchanging session keys and authenticating the users. Later they present the differences and similarities between all the four protocols and conclusion based on...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    An Efficient and Robust Multicast Protocol Over Mobile AD-HOC Network

    Group communications are important in Mobile Ad hoc NETworks (MANETs). Multicast is an efficient method for implementing group communications. However, it is challenging to implement efficient and scalable multicast in MANET due to the difficulty in group membership management and multicast packet forwarding over a dynamic topology. The authors propose...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Proposed Architecture for Network Management in Mobile Agent Based on Common Object Request Broker Architecture (CORBA)

    In this paper, the authors are going to introduce the proposed architecture for network management in mobile agent based on CORBA. Here, they are introducing operational environment that plays a vital role in network management for Mobile Agents. The architecture proposed by them consist of Agent Communication Manager (ACM), Agent...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Secure Scheme to Avoid Worm Hole Attacks in Ant Based Adaptive Multicast Routing Protocol for MANET

    Security issues are very important in mobile ad hoc network. The general attack in wireless network is the wormhole attack. In this wormhole attack two or more malicious nodes create the tunnel bypassing all the traffic. These tunnels emulates shorter links in the network in which adversary records transmitted packets...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Approaches & Challenges in 3D and Multi-Modal 3D + 2D Face Recognition

    This paper provides a concise & up-to-date review of research efforts in face recognition techniques based on 2D and 3D images. Recent research has also demonstrated that the fusion of different imaging modalities and spectral components can improve the overall performance of face recognition. The majority of face recognition methods...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    New Era in Technology: Grid Computing

    The Grid has the potential to fundamentally change the way science and engineering are done. Aggregate power of computing resources connected by networks - of the Grid-exceeds that of any single supercomputer by many orders of magnitude. Grid Computing, emerging as a new paradigm for next-generation computing, enables the sharing,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2011

    Performance Analysis of Effectiveness of AODV, DSDV and DSR Routing Algorithms in MANET

    The Mobile Ad hoc NETworks (MANETs) has gained an important part of the interest of researchers and become very popular in last few years. Mobile Ad hoc NETworks (MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2011

    Security: Issues and Challenges

    Has it happened yet? The phone call, the e-mail, the web-page, or may be the user discovered it. Something wasn't right: sluggish performance, too much overloaded network, a missing file. After a little investigation, the realization - the user have been cracked. If this isn't familiar to the user yet,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2011

    Myrinet-A GB(Gigabit) LAN

    Myrinet is a new type of Local-Area Network (LAN) based on the technology used for packet communication and switching within "Massively-Parallel Processors" (MPPs). Myrinet can be think as an MPP message-passing network that can span campus dimensions, rather than as a wide-area telecommunications network that is operating in close quarters....

    Provided By International forum of researchers Students and Academician