International forum of researchers Students and Academician

Displaying 201-240 of 388 results

  • White Papers // Feb 2012

    MANET Internet Integration: A Survey Based Study

    Mobile ad hoc network being easy to deploy, self organized, flexible and independent of any pre-established infrastructure has become main component of research. But the research in the field of ad hoc network is restricted to stand-alone isolated networks. To widen the network coverage and application domain of ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Secure Authentication Scheme for Mobile Ad Hoc Networks

    In Mobile Ad hoc NETworks (MANETs), it is easy to launch wormhole, man-in-the-middle and Denial of Service (DoS) attacks, or to impersonate another node. The authors' studies show that there are performance and security problems with the existing authentication and keying mechanisms which are currently employed by wireless ad hoc...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Capacity and Cell Range Assessment for Multitraffic User in Mobile WiMAX

    Radio technology advanced rapidly to enable transmission over larger distances with better quality, less power, smaller and cheaper devices. A cursory look into the history of wireless communications will reveal that every new wireless system improved on previous ones. The chance for WiMAX (IEEE -802.16e-2005 standard) to serve those who...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Two Phase Energy Optimisation in Android Phones

    'Computing eats up energy' - and it's not a trivial matter. Processors are said to be the incipient of modern day computing era. Deploying the best processor is always marked by the one which leads to highest efficiency in energy saving without degrading system's performance. In this battle-ground of Excellency...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Dynamic Periphery Multicast Routing Protocol

    In this paper, the authors describe a new multicast routing protocol for mobile ad hoc wireless networks. The protocol establishes a source based mesh of nodes called with no static periphery or zone to distribute data for that source. The notion of zone or a flooding group is different the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Propagation Path Loss Measurements and Spline Interpolation for Missing Data

    Now-a-days the most of straight wired network systems are replaced by the wireless network systems. The authors know the main difference in between these two is the change from a fixed network location to mobile network location, i.e., an address is no longer a physical location and an address will...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Handover Probability Analysis for B3G Heterogeneous Wireless Networks

    Wireless communications play an important role for providing global information access to the users. One of the main challenges for seamless mobility is the availability of simple and robust handoff algorithms, which allow a mobile node to roam among heterogeneous wireless networks and also meets the challenges for the emerging...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Identifying Mischievous Users in Private Networks and Status Updating in Android Mobile

    Basically in anonymizing networks users privately access Internet services with the help of routers; the reason behind this is to hide the user's IP address. The disadvantage here is that users are taking advantage of this to deface websites. To overcome this problem administrator tries to block IP address of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    ERP IN E-Business World

    ERP is the acronym for Enterprise Resource Planning. ERP is a software application to improve the performance of organizations' resource planning, management control and operational control. ERP software is multi-module application software that integrates activities across functional departments, from product planning, parts purchasing, inventory control, product distribution, order tracking. This...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multi Criteria Based Multicast Routing for Wireless Mobile Ad Hoc Networks

    Mobile ad hoc network is a collection of independent mobile nodes that can communicate to each other via radio waves. The mobile nodes that are in radio range of each other can directly communicate whereas the others need the aid of intermediate nodes to route their packets. These networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Static Voltage Stability Indication in a Power System Using ANN

    The paper presents an approach for indication of static voltage stability conditions of a power system using Artificial Neural Network (ANN) as a correlator to correlate voltage stability index and bus loading index and corresponding bus voltage. The approach uses voltage stability indices and bus loading indices along with bus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Improved ODMRP With Motion Detection Approach

    Many network applications require transmitting the same single copy of data packets concurrently to many destinations. Applying the infrastructure-based multicast routing protocols in Mobile Ad hoc wireless NETworks (MANETs) is a big challenge. Factors that make Multicasting in ad hoc networks is more complex than in wired networks are host...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Interworking of 3G and 802.11 Networks: Present and the Future Ahead

    With the wide-spread deployment of 3G services in most of the countries and continuous increasing demand of Smartphones and iPhones, past has experienced a substantial increase in cellular data traffic. Since the licensed spectrum over which the 3G services are delivered is costly and scarce, mobile operators have already started...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Multicast Genetic Zone Routing Protocol

    Multicast Zone Routing Protocol (MGRP) is the most promising and widely accepted and well proved hybrid routing protocol in Mobile Ad-hoc NETworks (MANETs) for its performance when compared in order to load balance the network, with table-driven demand protocols. This study is aimed to provide a set of available paths...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Mobile Crawler Using Aglets Technology Instead Web Crawlers

    To search Information on the Internet (World Wide Web) users make use of search engines. To search the user's information search engines make use of the Web Crawlers. Web crawlers has to index millions of web pages to make the searching efficient, also web crawlers has to visit the web...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Pragmatic Study of Underwater Acoustic Sensor Network and Global Wireless Network

    Two third of the earth is covered with water and there has been a growing interest in monitoring underwater medium for scientific exploration and attack protection. Underwater sensor nodes will find application in ocean-graphic data collection, pollution monitoring, disaster prevention and tactical surveillance application. Underwater network consist of a variable...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Based Wireless Sensor Network For Signal Classification

    The tremendous increase in the Wireless Sensor Network (WSN) in the last decade has increased the potential applications including environment monitoring, smart spaces, medical systems, and robotics exploration. Sensors integrated into structures, machinery, and the environment has led to fewer catastrophic failures, conservation of natural resources, improved manufacturing productivity, improved...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Spectral Entropy Based VAD Using Teager Energy Operator and HOS

    In this paper, the authors presents Voice Activity Detection (VAD) algorithm for detecting voice in noisy environments. The presented robust VAD utilizes the Spectral Entropy (SE) with Teager Energy Operator (TEO) to provide a better representation of formant information resulting in high performance of classification of speech/non-speech priori to entropy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Survey Report on Implementation of Optimized Cryptographic Algorithm

    Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Cryptographic algorithms are widely used in Internet Systems. Applications of cryptographic algorithms include credentials establishment i.e....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Proposed Architecture for Agent Communication Manager in Mobile Ad-hoc Network

    In this paper, the authors are going to introduce the proposed architecture for agent communication manager in MANETS. Here they are introducing a manager for agent communication that support the dynamic as well the static infrastructure according to the nature of the problem. The architecture proposed by them consists of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Performance Analysis of Convolutionaly Coded MC-CDMA System Using Modulation Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) has recently gained a lot attention and is a potential candidate for Fourth Generation (4G) wireless systems because it promises data rates up to 10Mbps. A variation of OFDM is Multi-Carrier CDMA (MC-CDMA) which is an OFDM technique where the individual data symbols are spread...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    A Survey on Cryptographic Techniques for Privacy Preserving Data Mining

    Data security is a major and increasingly interested area of research in data mining. Cryptographic techniques have proved beneficial in secured distributed computation. Many techniques have been under research to achieve privacy protection for sensitive data. In this paper, the authors first provide an overview on important cryptographic techniques used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Learning of Classification Rules Through Ant Colony Optimization Method

    Ant Colony Optimization (ACO) algorithm is gaining major interest as a well-known meta heuristic technique. ACO has a prospective application as a data classifier. The use of ant miner may become very effective for learning of classification rules. Nowadays the field of multi objective optimization is dealing with such mission...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Conditional Functional Dependencies in Data Cleaning

    Functional dependency is an important feature for referencing to the relationship between attributes and candidate key in tuples. It also shows the relationship between entities in a data world. For data cleaning one typically needs a simple extension of traditional FDs that suffices to capture data inconsistencies commonly found in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Cost Effective and Flexible Database Design Using Parameter Tables

    Software costs form a major chunk of the total cost of any IT initiative since the hardware costs have gone down drastically due to advances in the hardware sector. The software costs consist of developmental and operational costs. The quality of Database design has a huge impact on these costs....

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Comparison of Data Mining and Web Mining

    The increasing amount of web data available in static websites - web1.0, dynamic websites - web2.0 and semantic websites - web3.0 on the world wide web is becoming one of the most valuable resources for information retrieval and knowledge discovery. The known fact information and knowledge management, data mining and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    An Architecture for Mining WEB Content Hosted on Clustered Backend Servers

    Web content mining is mining of various types of content that include Text, Images, data, etc that are provided in terms of various types of WEB resources that include HTML, DHTML, XML, PHP, JSP, ASP, DLL etc. Sometimes the entire WEB content is horizontally portioned and each of the partition...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Analysis of Security Threats and Performance Evaluation of Some Block Structured Ciphers

    The essential technology underlying virtually all automated networks and computer security applications is encryption. The hackers try their effort in concealing, fabricating and intercepting the transmitted data by attacking the information security system. These security threats are classified as passive and active threats. In this paper, the authors have made...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Data Mining Application in Management Studies

    Despite the importance of data mining techniques to Customer Relationship Management (CRM), there is a lack of a comprehensive literature review and a classification scheme for it. This is the first identifiable academic literature review of the application of data mining techniques to CRM. It provides an academic database of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    An Approach to Cognition Built-In Knowledge Discovery

    Knowledge discovery is a data mining problem. Data mining is complex especially when the data size huge. Efficient data mining algorithms are required for mining large size data. It has been provided that knowledge base is required which is nothing but user beliefs, experiences and intuitive thinking for mining useful...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Area Efficient Architecture for VLSI Implementation of Wavelet Packet Decomposition

    Interest in wavelet transformation has greatly increased as their applications become more numerous. Traditional digital signal -processors have limited capabilities for processing such high volume data efficiently at real-time or near real-time. This paper is directed towards improving the Convolutional architecture for implementing Wavelet Packet Decomposition (WPD). This paper presents...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    VLSI Design Approach for Efficient Pattern Recognition Algorithms: Review

    The increasing demands of speed and performance in pattern recognition and machine intelligence generated a revolutionary super-computing technology. VLSI technology, which possesses properties of low-cost, high-speed and massive computing capabilities, is a suitable design solution. Due to the fast progress of VLSI technology, algorithm-oriented array architectures appear to be effective,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Low Power & Low Noise Operational Amplifier

    In this paper, the authors discuss the background and motivation behind the low power low noise operational amplifier. This paper also discusses the need of low noise and low power amplifier and its applications. In concern of power, a low power design has made a revolutionary change in the people...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    A Proposed Cryptographic Algorithm Provides Better Data Security

    RSA algorithm uses integer factorization as the backbone of data security while Diffie-Hellman Algorithm uses Discrete Logarithm to provide platform for secure key exchange. In this paper, the authors provide algorithm to merge both of them to provide a user with even higher level of data security. Actually, their intent...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Mobile Payment System-A Secure Approach

    This paper is to design a complete architecture and model of SMS-based mobile payment system, which could be used to implement a wireless platform for transferring money from one person to other person, paying utility bills and etc. Mobile communication devices have become popular tools for gathering and disseminating information...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Polling Algorithm for Dynamic Bandwidth Distribution in LR-PON

    With the advances in optical technology, long-reach PON increased the span of a broadband access network using PON technology from today's standard of 20 km to 100 km or higher. This technology can enable broadband access for a large number of customers in the access/metro area. In LR-PON the propagation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Two Layer Intrusion Detection System for Mobile Devices

    In recent years, the usage of mobile devices has increased like anything. Mobile devices are more used for gaming, video streams, transferring files, connecting to internet rather than voice or text communication. At this point of time, a strong Intrusion Detection System (IDS) for mobile devices is must. Even though...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Automated Generation of Test Data for Evolutionary Testing With Empirical Study Using AspectJ Programs

    In today's programming paradigm research interest is moving from object oriented programming to Aspect oriented programming. Most of the research on aspect oriented programs was targeted towards the programming, not for testing. Automation of AOP testing is a new research area and very few researchers are working on automation of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    Exploring Smart, Efficient and Robust Routing Algorithm for VANET

    This paper gives the insight of VANET and the new techniques by which the performance of VANET can be improved. There by making the VANET more intelligent smart and robust. Here the hybrid techniques are used to measure the various parameters of VANET. VANET is an emerging technology to achieve...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jan 2012

    The MPEG-7 Standard

    MPEG-7, formally known as Multimedia Content Description Interface, includes standardized tools (descriptors, description schemes, and language) enabling structural, detailed descriptions of audio - visual information at different granularity levels (region, image, video segment, collection) and in different areas (content description, management, organization, navigation, and user interaction). It uses XML to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Improving the Atmospheric Delay Effects on the Received Global Positioning System Signals

    There are several error sources that cause the estimated position and time measuring from Global Positioning System (GPS) receivers to be inaccurate. The most significant error sources are the satellite clock drifts, mismodeling of gravitational and non-gravitational forces in combining the orbits, geometry of the satellites, ionospheric and tropospheric atmospheric...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Techniques to Improve Performance of VoIP Over 802.11e WLAN

    Voice over Internet Protocol is an important service with strict quality of requirements in Wireless Local Area Network (WLANs). The IEEE 802.11e standard has been introduced recently for providing Quality of Service (QoS) capabilities in the emerging Wireless Local Area Networks. This 802.11e introduces a contention window based that is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Load Balancing in Wireless Mobile AD HOC Networks

    Ad hoc networks consist of a set of homogeneous nodes (computers or embedded devices) that move in an independent fashion and communicate with the other node in the topology over a wireless channel. Such networks are logically realized as a set of clusters by grouping together. Nodes which are in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Distributed DACS Based on Low Cost Internet Controlled Embedded Servers

    Now-a-days everyone using many networked embedded systems for monitoring and control the home or industrial devices. With the scalable networking solution, the server enables web access to distributed measurement/control systems and provides optimization for educational laboratories, instrumentation, industrial and home automation. In this paper, the authors present the principles and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Identification of Web User Sessions using Clustering Technique

    The common definition of a user-session is given by a period of time during which the user is generating traffic in internet a user-session is then terminated by a "Long" inactivity period. Within an activity period, many TCP connections may be used to transfer data. Unfortunately, the identification of active...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Multi-Copy: Routing Efficiently in Intermittently Connected Mobile Networks

    Intermittently connected mobile networks are wireless networks where most of the time there does not exist complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this paper, conventional...

    Provided By International forum of researchers Students and Academician

  • White Papers // Oct 2012

    Analysis of BER in BPSK and GMSK Employing Different Coding

    In this paper, BPSK and GMSK communication system model using AWGN channel and different coding and decoding is analyzed. In the paper performance of BPSK using Convolutional coding and viterbi decoding is compared to GMSK uncoded and GMSK employing Reed Solomon coding. The simulation shows that GMSK using Reed Solomon...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Cookies Based Intrusion Attacks and Detection Techniques Over DRDOS Attack

    Network introduces security problems, threats, risks and other types of attacks like internal and external attack. DoS is the most debilitating attack in the Internet and yet it still remains an open research topic. Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    A Generalized Call Admission Control Scheme for Overflowed Traffic in Multilayer 3G Wireless Mobile Networks

    Multilayer cell structure has become a major trend in the design of 3G wireless mobile networks in order to support the high capacity demand required for various types of traffics in 3G systems. In this type of network an efficient call admission control scheme is required to improve the Quality...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparative Analysis of Energy Consumption in Various Routing Protocol for Mobile Ad Hoc Network

    An ad-hoc network is the cooperative engagement of a collection of mobile hosts without the required intervention of any centralized access point. In this paper, the authors present an innovative design for the operation of such ad-hoc networks. The design of efficient routing protocols is a fundamental problem in a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Parallel Searching Algorithm on Hypercube Interconnection Network

    In the information age, the huge amount of data and information are exchanged which requires fast and efficient searching mechanisms for effective use of this information. There are various sequential searching algorithms to search an element in an unsorted array or sorted array of elements. A number of researchers have...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Round Robin CPU Scheduling Algorithm

    The main aim of this paper is to propose a new approach for round robin scheduling which helps to improve the performance of CPU in real time and time sharing operating system. Existing CPU scheduling algorithm cannot be implemented in real time operating system due to their high context switch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparison of Position Based Routing Protocol and Topology Based Routing Protocol in VANET

    The Vehicular Ad hoc NETwork (VANET) is an emerging new technology. Which will make the life easy VANET is one of the influencing areas for the improvement of Intelligent Transportation System (ITS) in order to provide safety and comfort to the road users. Besides safety applications VANET also provide comfort...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Survey of Black Hole Attack and Its Solutions in Mobile Adhoc Networks

    MANETs are infrastructure less network. It is difficult to design robust security solutions for MANETs. In MANETs, nodes themselves do routing and forwarding functions. Sometimes, nodes show selfish behavior and do not forward packets of other nodes. This is known as black hole attack. It results in reduction in network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Effective Synthesis of Health Science and Telemedicine by Using Body Area Network

    Body Area Networks (BANs) are wearable wireless sensor networks with a high potential for medical and sports applications. A body area network is formally defined as, "A communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Simulation Based Comparison of BER With Different Equalizers in Multipath Fading Channel

    The term equalization can be used to describe any signal processing operation that minimizes inter symbol interference. This paper shows comparison of bit error performance with different equalizers in multipath fading channel. Here, the authors discussed various types of algorithm used in equalization and the performance played by algorithm to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Analysis of Rectangular Micro Strip Antenna

    Micro strip antennas now a days had a wide application but unless analysis and optimization for rectangular micro strip antenna is made it is not possible to get high end performance from them. Several methods are there for to calculate the resonant frequency of a microstrip antenna using rectangular cavity...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Lightweight Soft-State Tracking Framework for Dense Mobile Ad Hoc Networks

    In a mobile ad hoc network, tracking protocols need to deal with - in addition to the mobility of the target - - the mobility of the intermediate nodes that maintain a track toward the target. To address this problem, the authors propose the MDQT (Mobility-enhanced Distributed Quad Tree) tracking...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    IPv6 Considered Harmful in Computer Network

    The investigation of the turing machine has developed e-business, and current trends suggest that the evaluation of lambda calculus will soon emerge. Given the current status of concurrent epistemologies, statisticians obviously desire the key unification of von Neumann machines and suffix trees, which embodies the significant principles of electrical engineering....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Load Balancing in Grid Computing

    Computing grids are conceptually not unlike electrical grids. Grid computing uses middleware to coordinate disparate IT resources across a network, allowing them to function as a virtual whole. The goal of a computing grid, like that of the electrical grid, is to provide users with access to the resources they...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Mobile Adhoc Networks and PTP Network

    In this paper, the authors will discuss about Mobile Ad hoc NETwork (MANET) that is also known as mobile mesh network is a wireless network that use wireless transmission for communication and do not rely on any central coordinator. They will also discuss bootstrapping of PTP network. Mobile nodes that...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Systematic Approach for Estimation and Evaluation of Software Metrics

    In Software industry, success of any organization is depends on how good they estimate actual effort and size of the software. Software cost estimation is the process of predicting the effort required to develop a software system. The selection of model for estimation is the most critical process for organization....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Overview of Anonymous Routing Protocols to Overcome Passive Attack in Mobile Ad-Hoc Networks

    With the wide use of mobile devices in mobile ad hoc networks, maintaining anonymity is becoming an increasingly important issue. Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Evaluation and Modification in Partition Based Clustering Techniques

    Powerful systems for collecting data and managing it in large databases are in place in all large and mid-range organizations. The value of raw data(collected over a long time) is on the ability to extract high-level information: information useful for decision support, for exploration, and for better understanding of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Scalable and Efficient Key Management in LAN

    As LAN has some limitations, pre-distribution of secret keys is possibly the most practical approach for secure network communications. In this paper, the authors propose a key management scheme based on random key pre-distribution for LAN. As large-scale networks suffer from high costs of communication, computation, and storage requirements, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    QOS Parameter Analysis on AODV and DSDV Protocols for MANETS

    QoS (Quality of Service) is rapidly growing area in MANETs the authors mean a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the wireless network...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    MATLAB Based Enhanced System for Online Data Acquisition and Processing of Iris

    Biometrics refers to the automatic identification and authentication of individuality of a human being based on their iris data, retina data, face structure, voice, finger prints, etc. Biometrics basically consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Nowadays iris detection and...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Biometrics in Mobile Security

    The term Biometrics is a combination of word bio and metrics. Bio means life and metrics means measurement. Biometrics means the measurement of unique human characteristics for recognition of an individual by measuring fingerprints, face, signature, voice of combination of all these. Today, biometrics is widely used for mobile security....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Challenges and Associated Mitigations in Providing QoS Support to MANET

    Mobile Ad hoc NETworks (MANET), which Comprise of mobile nodes connected wirelessly, are emerging as a very important technology for future generation of wireless mobile and ubiquitous computing. To support real-time communications (i.e., audio and video) over MANETs, Quality of Service (QoS) provisioning mechanisms need to be developed. QoS is...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Tiny MAC for Message Authentication in Constrained Resource Network Environments

    Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and specially energy hinders the deployment of many modern cryptographic algorithms known to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    An Efficient Cross Authentication Protocol in VANET Hierarchical Model

    This paper proposes an efficient scalable authentication scheme for secure communication in Vehicular Ad-Hoc NETwork (VANET). The proposed protocol works on a hierarchical model and hence scalable. Security analysis shows the robustness against the conventional attacks and the simplicity of the protocol makes it cost efficient. Vehicular ad-hoc networks form...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Spectrum Management Policy for Wireless Ad Hoc Cognitive Radio Networks

    Wireless communication attracts enormous investments, while at the same time user requirements continuously increase. Moreover, evolution in wireless technologies should keep pace with the aforementioned fields, in order to facilitate the integration of innovative services and applications in everyday communication. Ad hoc wireless networks will soon be utilized for public...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Optimizing Multiple Knapsack Problem Using Ant Colony Optimization

    In computer science and operations research the Ant Colony Optimization algorithm (ACO) is a probabilistic technique for solving computational problems which can be reduced to finding good paths through graphs. The knapsack problem is one of the most studied problems in combinatorial optimization, with many real-life applications. For this reason,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Improving the Performance of Transport Layer Protocol in MANETs Using Modified Route Control Mechanism

    In MANETs, due to frequent node mobility, data packets switch from one route to another route without the knowledge of sender. Due to this, packets may not be delivered to the receiver in order or packets may be delayed before which the receiver sends a Duplicate ACK to the sender...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Comparative Study of the Phases of Wireless Intelligent Network

    The primary weapon for empowering providers to deliver distinctive services with enhanced flexibility is Wireless Intelligent Networks (WINs). The Wireless Intelligent Network seeks to win and retain subscribers with a proven and scalable solution. Today's wireless subscribers are much more sophisticated telecommunications users than they were five years ago. No...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Compare the Network Friendliness of Transport Layer Based Mobility Protocols

    The authors propose and estimate a original transport layer mobility management scheme. In network layer based mobility protocols, such as mobile IP, the correspondent node is not alert of handovers and therefore continues to send data at the same rate as before the handover which may demonstrate network unsociability, especially...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Simulation Based Framework to Characterize Pseudonymous Authentication in VANET

    Privacy & security are two essential security attributes of secure Vehicle-To-Vehicle (V2V) communications. To achieve the required security attributes, Public Key Infrastructure (PKI) and later Pseudonymous Public Key Infrastructure (PPKI), have been proposed. In PPKI, each vehicle is initially allotted a number of pseudonyms by the Certification Authority (CA). Each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    A Novel Approach to Enhance AODV Security in Case of Multicast

    It is well-known that security today has become a primary concern in order to provide secure communication between mobile nodes. It is very important to protect the network from hackers. For most existing routing protocols of Mobile Ad hoc NETwork (MANET) efficient security mechanisms against the attacks from malicious &...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    A Study on Security in Internet Enabled TV

    During the course of its research, the security firmware of the TV's Internet interface failed to confirm script integrity before scripts were run. The attacker could intercept transmissions from the television to the network using common DNS, DHCP server, and TCP session hijacking techniques. The code could then be injected...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Naive Parameter for the Network Erasure Coding for Video Transmission Over a Wireless Network

    Various methodologies have been proposed in order to predict and enhance the reliability of a network. The basic problem lies with the networks where there is erasure of some packets or data and the reliability of the network cannot be predicted due to high instability and SNR. In order to...

    Provided By International forum of researchers Students and Academician