International forum of researchers Students and Academician

Displaying 201-240 of 537 results

  • White Papers // Feb 2013

    A Survey of Security Issues in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are becoming very attractive for both telecommunication and network industry. WSNs are a most challenging and emerging technology for the research due to their vital scope in the field coupled with their low processing power and associated low energy. Today Wireless Sensor Networks are broadly used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Acquisition and Delivery in Traffic Monitoring VANETs Joint Optimization

    Vehicular Ad-hoc NETworks (VANETs) are envisaged to become a flexible platform for monitoring road traffic, which will gradually replace more cumbersome fixed sensor deployments. The efficacy of vehicle-assisted traffic monitoring systems depends on the freshness of traffic data that they can deliver to users, and the bandwidth used to do...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Remote Monitoring & Control of Wireless Sensor Network Using Smart Phone

    In this paper, the authors describe the design of a Wireless Sensor Network based on ZigBee technology. It is mainly used for collecting and transferring the various monitoring information about the coal mine underground with the help of WSN. Then the data will be analyzed and processed in the monitoring...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Embedded Based Finger Print Recognition System For Time and Attendance

    The main objective of this paper is to develop an embedded system, which will record the time and attendance of an employee in an organization and send monthly record of employee's work hours to organization using finger print recognition module which is interfaced with microcontroller. Whenever the employee enters the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Survey on Data Mining in Cloud Computing

    Data and information has a significant role on human activities, thus data sources are growing to be larger and distributed. But the main problem is not storing data; it is analyzing, mine, and process data for understanding it. Current era is of networking and communication; people are interested in keeping...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Approach for Enhancement of Data Security in Cloud Computing-A Review

    Cloud computing is an emerging trend which can transform information technology and the way it is used. The main issue is data security as it should not be a concern over the large data to be shared in cloud and hence not limit its use. This is a review of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Optimized Data Warehouse Model Through Pentaho ETL Tool

    Extraction-Transformation-Loading (ETL) tools are available for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In this paper, the authors have focus on how to build optimized data warehouse model through Pentaho ETL tool. Initially they have taken data set that is given...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    A Review on RFID Data Cleaning Problem Using Data Mining Tools

    The data stream produced by RFID reader is sometimes inaccurate. As a result there is a big load of unreliable data which is useless for higher level processing. Therefore the authors need to clean this unreliable data which they sometimes call dirty data. Dirty data appears in three reading errors...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Vehicular Traffic Surveillance Using Multiple Methodology

    Digital image processing is the use of computer algorithms to perform image processing on digital images. As a subcategory or field of digital signal processing, digital image processing has many advantages and applications. One of the applications of digital image processing is for traffic analysis. In literature survey found that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Indoor Location Determination by Using RFIDs

    With the Growing usage of smart software that uses the location information, automatic location sensing became a necessity in everyday life. There is the Global Positioning System (GPS) which is a satellite based navigation system made up of a network of 24 satellites placed into orbit. GPS is widely used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Analysis of Document Retrieval System

    In this paper, the authors provide analysis of document retrieval system using Lucene. This paper also describes development and implementation of document retrieval system based on content of document using Lucene technology. It explains significance of Term frequency and Inverse document frequency in Lucene's document scoring formula. Lucene is a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Fine Grained Partitioning for Transactional Database Using Lookup Table

    In web and OLTP databases, the most common strategy for scaling database workload is to horizontally partition the database using hash or range partitioning. It works well in many simple applications such as an email application. In other applications like social networking, workloads involving many-to-many relationships are hard to partition....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Data Mining: Tools and Techniques

    The data collected from different applications require proper mechanism of extracting knowledge/information from large repositories for better decision making. Knowledge Discovery in Databases (KDD), often called data mining, aims at the discovery of useful information from large collections of data. Data mining is the process of finding new patterns from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Design and Implementation of FLEXRAY for Distributed Injection Molding Machine based on ARM Controller

    A new Flexray based distributed intelligent control of combining the features of the injection moldings machine is proposed. The innovative application of the Flexray technology in the control system of the injection molding machine enables the simple processing procedure self-learning, fault diagnosing and process parameters optimizing. Embedded technology and Flexray...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2013

    Monitoring & Detecting the Application Layer DDOS Attacks that Affects Popular Websites

    One of the major threats for the Internet's reliability and stability is Distributed Denial-Of-Service (DDOS) attack. The attackers are becoming more sophisticated and organized; also several high-profile attacks targeted prominent websites. These are the prime reasons that gained importance for the study of DDOS attack detection and prevention. It becomes...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Review on Data Security in Data Warehousing

    Data Warehouses are used for storing historic and current data and are used for creating trending reports for annual and quarterly comparisons for the enterprises. Data Warehouses are the most valuable assets which contains critical business data and information for the enterprises in today's world. Most of the existing data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Technique to Secure Communication Using Chaos Generated by Non-Linear Circuits

    Secure communication is effected by encoding and decoding a simple message using chaotic non-linear circuits. A Non Linear Circuit is designed for generating the chaos in its output voltage. Time evolutions of generated chaos are studied with respect to two of the operating parameters of the circuit. Chaotic regimes of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Evaluation Model for Threshold Cryptography in MANETS

    A Mobile Ad hoc NETwork (MANET) is a collection of low-power, wireless, mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. In comparison with traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure instead hosts rely on each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Multi-Path Dynamic Routing for Computing and Constrained Mobile Ad-Hoc Network Environment

    Wireless mobile ad-hoc networks are classified as networks where nodes are logically connected with each other. These types of networks do not have fixed topology due to the mobility property of nodes, interference, propagation and loss of path. Hence a dynamic source routing protocol is required for these networks to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Survey on Unicast and Multicast Routing Protocols for Mobile Ad-Hoc Networks

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Intrusion Detection System in Ad-Hoc Network

    Intrusion detection prevention measures, such as encryption and authentication can be used in ad-hoc networks to reduce intrusions but cannot eliminate them. For example, encryption and authentication cannot defend against compromised mobile nodes, which often carry private keys. Integrity validation using redundant information (from different nodes), such as those being...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Novel Approach for Efficient Delay Tolerant Networks Using Conditional Shortest Path Routing

    This paper deals with Delay Tolerant Networks (DTNs) where each node knows the probabilistic distribution of contacts with other nodes. Delay tolerant networks are characterized by the sporadic connectivity between their nodes and therefore the lack of stable end-to-end paths from source to destination. Since the future node connections are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Improving Network Processing Technique in Internet Controlled Embedded Systems

    The RTCS Embedded Internet stack provides IP networking for the MQX platform. RTCS is provided with a rich assortment of TCP/IP networking application protocols and uses the MQX RTOS drivers for Ethernet or serial connectivity. RTCS is tightly integrated with the latest ColdFire and Power Architecture processors from Freescale and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Secure Usability Design System for User Authentication

    The term usable authentication is been brought about as a result of issues surrounding user memorabiilty. Computer users find it less easy to memorize plain text password compared to images or graphics. Researchers have over the years presented several authentication schemes in an effort to provide users with a usable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Performance Evaluation of Different Level Modulation Schemes for an Efficient Mobile WiMAX System in OFDM Under Rayleigh Fading and AWGN Channel

    Mobile WiMAX technology has become one of the fastest growing arenas of internet accessing in the people modern daily life. WiMAX is introduced by the Institute of Electrical and Electronic Engineers (IEEE) to provide a worldwide interoperability for microwave access. IEEE 802.16e-2005 has been developed for mobile wireless communication which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Dynamic Path Optimization CBET Technique Using for MANETS

    Efficient scheduling of processes on processors of a Network Of Workstations (NOW) is essential for good system performance. However, the design of such schedulers is challenging because of the complex interaction between several system and workload parameters. Co-scheduling, though desirable, is impractical for such a loosely coupled environment. Two operations,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Optimized Routing Algorithm for Congestion Control in Wireless Sensor Networks

    The previous routing approaches like Purely Random Propagation (PRP), Non-Repetitive purely Random Propagation (NRRP), Directed Random Propagation (DRP) perform the routing of packets without considering congestion might occur. When the intermediate nodes receive a huge amount of packets they directly drop the packets. The second problem is that there will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Route Handoff Using Channel Aware Routing Protocol in MANETs

    A Mobile Ad-hoc NETwork (MANETs) is a spontaneous network that can be established with no fixed infrastructure. Mobile ad-hoc networks are characterized by multi-hop wireless links and absence of any cellular infrastructure. Transmissions of packets are impaired by radio link fluctuations. Thus, in this paper an enhanced, channel aware routing...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Integer Wavelet Based Steganographic Model by Selecting Variable Bit Length

    To enhance the embedding capacity of image steganography and provide an Imperceptible stego-image for human vision, an integer wavelet based data hiding with variable bit length substitution method employing secret-key is proposed in this paper. The new technique embeds binary bit stream in 8-bit color image (RGB channel). The technique...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    An Implementation of Web Content Extraction Using Mining Techniques

    Web mining is a class of data mining. In order to relieve a \"Data rich but information poor\" dilemma, data mining emerged. Web mining is a variation of this field that distils untapped source of abundantly available free textual information. The importance of web mining is growing along with the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    Web Usage Mining: Pattern Discovery and Forecasting

    Web usage mining: automatic discovery of patterns in click-streams and associated data collected or generated as a result of user interactions with one or more web sites. In this paper, the authors describe web usage mining for their college log files to analyze the behavioral patterns and profiles of users...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    An Impulsive Bit Plane Complexity Segmentation Approach to Steganography

    Steganography is a technique to hide secret information in some other data without leaving any evidence of data alteration. All of the traditional steganographic techniques have curbed information hiding capacity. The original and derived Bit Plane Complexity Segmentation (BPCS) method embeds as much data as possible into a cover image...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    An Agent-Fuzzy Hybrid Approach to Control Bullwhip Effect in Supply Chain Networks

    Most omnipresent technologies used in supply chain management are software agents. Software agents also called \"Agent-refereed\"- e-commerce. Agent-Based Role Modeling (ABRM) approach and MA CBR approach of multi agent in case base reasoning and fuzzy agent-which is started to achieve better designs in agent technology. In the recent past, lots...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Cookies Based Intrusion Attacks and Detection Techniques Over DRDOS Attack

    Network introduces security problems, threats, risks and other types of attacks like internal and external attack. DoS is the most debilitating attack in the Internet and yet it still remains an open research topic. Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    A Generalized Call Admission Control Scheme for Overflowed Traffic in Multilayer 3G Wireless Mobile Networks

    Multilayer cell structure has become a major trend in the design of 3G wireless mobile networks in order to support the high capacity demand required for various types of traffics in 3G systems. In this type of network an efficient call admission control scheme is required to improve the Quality...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparative Analysis of Energy Consumption in Various Routing Protocol for Mobile Ad Hoc Network

    An ad-hoc network is the cooperative engagement of a collection of mobile hosts without the required intervention of any centralized access point. In this paper, the authors present an innovative design for the operation of such ad-hoc networks. The design of efficient routing protocols is a fundamental problem in a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Parallel Searching Algorithm on Hypercube Interconnection Network

    In the information age, the huge amount of data and information are exchanged which requires fast and efficient searching mechanisms for effective use of this information. There are various sequential searching algorithms to search an element in an unsorted array or sorted array of elements. A number of researchers have...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Round Robin CPU Scheduling Algorithm

    The main aim of this paper is to propose a new approach for round robin scheduling which helps to improve the performance of CPU in real time and time sharing operating system. Existing CPU scheduling algorithm cannot be implemented in real time operating system due to their high context switch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparison of Position Based Routing Protocol and Topology Based Routing Protocol in VANET

    The Vehicular Ad hoc NETwork (VANET) is an emerging new technology. Which will make the life easy VANET is one of the influencing areas for the improvement of Intelligent Transportation System (ITS) in order to provide safety and comfort to the road users. Besides safety applications VANET also provide comfort...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Survey of Black Hole Attack and Its Solutions in Mobile Adhoc Networks

    MANETs are infrastructure less network. It is difficult to design robust security solutions for MANETs. In MANETs, nodes themselves do routing and forwarding functions. Sometimes, nodes show selfish behavior and do not forward packets of other nodes. This is known as black hole attack. It results in reduction in network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Effective Synthesis of Health Science and Telemedicine by Using Body Area Network

    Body Area Networks (BANs) are wearable wireless sensor networks with a high potential for medical and sports applications. A body area network is formally defined as, "A communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Simulation Based Comparison of BER With Different Equalizers in Multipath Fading Channel

    The term equalization can be used to describe any signal processing operation that minimizes inter symbol interference. This paper shows comparison of bit error performance with different equalizers in multipath fading channel. Here, the authors discussed various types of algorithm used in equalization and the performance played by algorithm to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Analysis of Rectangular Micro Strip Antenna

    Micro strip antennas now a days had a wide application but unless analysis and optimization for rectangular micro strip antenna is made it is not possible to get high end performance from them. Several methods are there for to calculate the resonant frequency of a microstrip antenna using rectangular cavity...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Lightweight Soft-State Tracking Framework for Dense Mobile Ad Hoc Networks

    In a mobile ad hoc network, tracking protocols need to deal with - in addition to the mobility of the target - - the mobility of the intermediate nodes that maintain a track toward the target. To address this problem, the authors propose the MDQT (Mobility-enhanced Distributed Quad Tree) tracking...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    IPv6 Considered Harmful in Computer Network

    The investigation of the turing machine has developed e-business, and current trends suggest that the evaluation of lambda calculus will soon emerge. Given the current status of concurrent epistemologies, statisticians obviously desire the key unification of von Neumann machines and suffix trees, which embodies the significant principles of electrical engineering....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Load Balancing in Grid Computing

    Computing grids are conceptually not unlike electrical grids. Grid computing uses middleware to coordinate disparate IT resources across a network, allowing them to function as a virtual whole. The goal of a computing grid, like that of the electrical grid, is to provide users with access to the resources they...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Mobile Adhoc Networks and PTP Network

    In this paper, the authors will discuss about Mobile Ad hoc NETwork (MANET) that is also known as mobile mesh network is a wireless network that use wireless transmission for communication and do not rely on any central coordinator. They will also discuss bootstrapping of PTP network. Mobile nodes that...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Systematic Approach for Estimation and Evaluation of Software Metrics

    In Software industry, success of any organization is depends on how good they estimate actual effort and size of the software. Software cost estimation is the process of predicting the effort required to develop a software system. The selection of model for estimation is the most critical process for organization....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Overview of Anonymous Routing Protocols to Overcome Passive Attack in Mobile Ad-Hoc Networks

    With the wide use of mobile devices in mobile ad hoc networks, maintaining anonymity is becoming an increasingly important issue. Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Evaluation and Modification in Partition Based Clustering Techniques

    Powerful systems for collecting data and managing it in large databases are in place in all large and mid-range organizations. The value of raw data(collected over a long time) is on the ability to extract high-level information: information useful for decision support, for exploration, and for better understanding of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Scalable and Efficient Key Management in LAN

    As LAN has some limitations, pre-distribution of secret keys is possibly the most practical approach for secure network communications. In this paper, the authors propose a key management scheme based on random key pre-distribution for LAN. As large-scale networks suffer from high costs of communication, computation, and storage requirements, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    QOS Parameter Analysis on AODV and DSDV Protocols for MANETS

    QoS (Quality of Service) is rapidly growing area in MANETs the authors mean a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the wireless network...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    MATLAB Based Enhanced System for Online Data Acquisition and Processing of Iris

    Biometrics refers to the automatic identification and authentication of individuality of a human being based on their iris data, retina data, face structure, voice, finger prints, etc. Biometrics basically consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Nowadays iris detection and...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Biometrics in Mobile Security

    The term Biometrics is a combination of word bio and metrics. Bio means life and metrics means measurement. Biometrics means the measurement of unique human characteristics for recognition of an individual by measuring fingerprints, face, signature, voice of combination of all these. Today, biometrics is widely used for mobile security....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Challenges and Associated Mitigations in Providing QoS Support to MANET

    Mobile Ad hoc NETworks (MANET), which Comprise of mobile nodes connected wirelessly, are emerging as a very important technology for future generation of wireless mobile and ubiquitous computing. To support real-time communications (i.e., audio and video) over MANETs, Quality of Service (QoS) provisioning mechanisms need to be developed. QoS is...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Tiny MAC for Message Authentication in Constrained Resource Network Environments

    Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and specially energy hinders the deployment of many modern cryptographic algorithms known to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    An Efficient Cross Authentication Protocol in VANET Hierarchical Model

    This paper proposes an efficient scalable authentication scheme for secure communication in Vehicular Ad-Hoc NETwork (VANET). The proposed protocol works on a hierarchical model and hence scalable. Security analysis shows the robustness against the conventional attacks and the simplicity of the protocol makes it cost efficient. Vehicular ad-hoc networks form...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Spectrum Management Policy for Wireless Ad Hoc Cognitive Radio Networks

    Wireless communication attracts enormous investments, while at the same time user requirements continuously increase. Moreover, evolution in wireless technologies should keep pace with the aforementioned fields, in order to facilitate the integration of innovative services and applications in everyday communication. Ad hoc wireless networks will soon be utilized for public...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Optimizing Multiple Knapsack Problem Using Ant Colony Optimization

    In computer science and operations research the Ant Colony Optimization algorithm (ACO) is a probabilistic technique for solving computational problems which can be reduced to finding good paths through graphs. The knapsack problem is one of the most studied problems in combinatorial optimization, with many real-life applications. For this reason,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Improving the Performance of Transport Layer Protocol in MANETs Using Modified Route Control Mechanism

    In MANETs, due to frequent node mobility, data packets switch from one route to another route without the knowledge of sender. Due to this, packets may not be delivered to the receiver in order or packets may be delayed before which the receiver sends a Duplicate ACK to the sender...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Comparative Study of the Phases of Wireless Intelligent Network

    The primary weapon for empowering providers to deliver distinctive services with enhanced flexibility is Wireless Intelligent Networks (WINs). The Wireless Intelligent Network seeks to win and retain subscribers with a proven and scalable solution. Today's wireless subscribers are much more sophisticated telecommunications users than they were five years ago. No...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Compare the Network Friendliness of Transport Layer Based Mobility Protocols

    The authors propose and estimate a original transport layer mobility management scheme. In network layer based mobility protocols, such as mobile IP, the correspondent node is not alert of handovers and therefore continues to send data at the same rate as before the handover which may demonstrate network unsociability, especially...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Simulation Based Framework to Characterize Pseudonymous Authentication in VANET

    Privacy & security are two essential security attributes of secure Vehicle-To-Vehicle (V2V) communications. To achieve the required security attributes, Public Key Infrastructure (PKI) and later Pseudonymous Public Key Infrastructure (PPKI), have been proposed. In PPKI, each vehicle is initially allotted a number of pseudonyms by the Certification Authority (CA). Each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    A Novel Approach to Enhance AODV Security in Case of Multicast

    It is well-known that security today has become a primary concern in order to provide secure communication between mobile nodes. It is very important to protect the network from hackers. For most existing routing protocols of Mobile Ad hoc NETwork (MANET) efficient security mechanisms against the attacks from malicious &...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    A Study on Security in Internet Enabled TV

    During the course of its research, the security firmware of the TV's Internet interface failed to confirm script integrity before scripts were run. The attacker could intercept transmissions from the television to the network using common DNS, DHCP server, and TCP session hijacking techniques. The code could then be injected...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Naive Parameter for the Network Erasure Coding for Video Transmission Over a Wireless Network

    Various methodologies have been proposed in order to predict and enhance the reliability of a network. The basic problem lies with the networks where there is erasure of some packets or data and the reliability of the network cannot be predicted due to high instability and SNR. In order to...

    Provided By International forum of researchers Students and Academician