International forum of researchers Students and Academician

Displaying 241-280 of 471 results

  • White Papers // May 2012

    A Survey on Various Machine Learning Techniques to Detect and Classify DDoS Attacks

    The rigorousness of Distributed Denial of Service (DDoS) attack exhibit a wide range of security needs. Detection and classification of DDoS attacks has become a very challenging research field. Keeping this in mind and to overcome the DDoS attack, in this paper the authors investigates the machine learning techniques that...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Bluetooth Chat Over Android in Mobile Network

    Android is an operating system for mobile devices such as Smartphones and tablet computers. Android is the first complete, open, and free mobile platform. It is developed by the Open Handset Alliance led by Google. If there's one time when "Cheap and easy" is a benefit, it's with mobile development....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Survey on Dynamic Slicing Techniques for Object-Oriented Programs

    Program slicing is an effective approach to narrow the concern, to the relevant parts of a program. Researchers have proposed various techniques for program slicing since years. In the classification of program slicing, it is found that dynamic slices are smaller than static slices and can be used more efficiently...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Securing OTP Transaction Using Mutual Authentication and Encryption

    Secure authentication schemes between an authentication server and users are required to avoid many risks on the Internet. A new one time password scheme is described which is secure against eavesdropping, server database compromise and generate Static key for encryption at the same time. That scheme is at least as...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Survey on Graphical Methods for Test Case Generation

    Goal of a simple test case generation is to find an input that will drive execution of a program along a particular path in its flow graph. Several researchers have proposed different techniques to generate test cases and in most of the approaches proposed so far, either the source code...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Novel Approach for Securing User Transactions Using Two Factor Mobile Authentication

    Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. During authentication, credentials presented by an individual are validated and associated with the person's identity. This binding between credentials and identity is typically done for the purpose of granting...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Short Study of Wireless Sensor Networks in Healthcare Applications

    Applications of Wireless Sensor Networks (WSN) are diverse. They range from home security to military surveillance. Advances in technology and high-end protocols developed for WSNs have increased the popularity of WSN in all major areas of application. One such application is healthcare monitoring. WSNs today are widely being used in...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Trust Management in Mobile Ad-Hoc Networks Using a Scalable Maturity-Based Model

    The trust management in mobile ad hoc network is for sending the message from source node to destination node in ad hoc networks. This sending process is based on trusting its neighbor node. The trust is based on previous individual experiences and on the recommendations of others. The Recommendation Exchange...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Clustering Technique for Load Balancing in MANETs

    A Mobile Ad hoc NETworks (MANETs) are a collection of mobile nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure and do not require any central administration. These mobile nodes will act as both node as well as routers. While routing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Interoperability Between Wireless Networks Using FPGA Based Advanced Gateway

    In a communication network, a network node equipped for interoperability with another network can use different protocols and frame formats. So, there is a need for protocol conversion to provide a match between the source and destination networks. To satisfy the requirements of protocol conversion and thus to provide interoperability,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Ensuring QOS in WiMAX Networks

    Quality of Service (QoS) is a key metric for bandwidth demanding applications in WiMAX (IEEE 802.16 standard) networks. It is achieved through bandwidth reservation for each application. Existing solution use priority-based scheduling algorithm to ensure the QoS guaranteed services. Although, it allows the Subscriber Station (SS) to adjust the reserved...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Implementation of Blake and RSA in a Fast Authentication Protocol for Wireless Mesh Networks on FPGA

    Encryption techniques like BLAKE and RSA is implemented in a fast authentication protocol based on tickets, which supports fast handoff mainly in real time applications like VoIP in Wireless Mesh Networks (802.11s). In this authentication protocol, the central server is not involved during authentication thus avoiding multiple hop transmissions. The...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Security Threats on Different Layers of Mobile Ad Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. The ad-hoc networks are a new wireless networking paradigm for...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    On Building Intelligence for Securing Communication Between the Tags and the Mobile Devices

    Tag is a small embedded system meant for identification of an object to which it is attached and in addition the TAGS can be made to be intelligent such that they can identify its own location, alert the master about an event occurring in its vicinity, sensing tampering with its...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    3D Face Recognition Using Radon Transform and PCA

    Three Dimensional (3D) human face recognition is emerging as a significant biometric technology. Research interest into 3D face recognition has increased during recent years due to availability of improved 3D acquisition devices and processing algorithms. A 3D face image is represented by 3D meshes or range images which contain depth...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Multimodal Biometric Based Person Authentication System Using Fisher Linear Discriminative Analysis (FLDA) Algorithm

    Biometric system allows automatic person recognition based on physical or behavioral features which belong to a certain person. Each biometric feature has its limits and no biometric system is perfect so unimodal biometric system raise a variety of problem and the experimental studies show that unimodal biometric systems had many...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Improving Semantic Web Service Composition Performance Using Apriori Algorithm

    There are many usages for the web services in the World Wide Web. For creating new services the people can compose other developed services in the way the people want to use them. The large amount of web services make composing of services a time consuming and impossible job. So...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Advanced Vehicle Positioning and Secured System

    This paper discussed a kind of design of vehicle location system based on ARM. The architecture and working theory of this system is introduced in details, and introduces the vehicle location system which uses the ARM microprocessors LPC2129 as a control unit to combinative with GPS LR9548 and GSM TC35...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    VLSI Implementation and Analysis of Cryptographic Algorithms for RC5 and Triple Data Encryption Standard

    In an age of technological advancements, security and privacy plays an important role in the day-to-day communications. With the advent of the internet, data security has become a topic of utmost importance. Through this paper, the authors wish to address this concern by carrying out a comparative analytical study of...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Enhance DataBase Performance With Clustering Algorithm

    Clustering, in data mining is useful for discovering groups and identifying interesting distributions in the underlying data and to fast query processing. Traditional clustering algorithms favor clusters with either spherical shapes or with similar sizes. The traditional algorithms are very fragile in the presence of outliers. The authors propose clustering...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Dynamic Clustering Approaches to Accord Updates in the Data Warehouse

    Data warehouses form the basis for performing data mining tasks such as classification and clustering. A data warehouse is constructed from multiple databases. Whenever the databases are updated, they are not immediately applied to the data warehouse. Typically updates are collected and applied to the data warehouse periodically. Then all...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Prioritizing Quality Requirements Based on Software Architecture Evaluation Feedback

    Quality attributes such as performance, reliability, and maintainability, are crucial for the success of any software system. The software architecture largely influences the quality properties a software system will exhibit. However, while quality requirements are defined in many companies mainly upfront, they are not systematically incorporated during development and thus...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Extended SNMP Agent for Network Device Management

    The SNMP (Simple Network Management Protocol) provides a method of managing network hosts such as workstation or server computers, routers, bridges and hubs from a centrally-located computer running network management software. SNMP performs management services by using a distributed architecture of management system and agent. The SNMP agents which are...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Consistent Data Access: An Effective Data Replication at Last Mile Services

    The up-coming last-mile services architecture assures to get the better ease of use and presentation of web services by making the servers available by distributing distributed globally. The main confront in such systems is data duplication and uniformity by which Last-Mile server code can control mutual data without deserving the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Protecting Privacy by Location Aggregation in Wireless Sensor Networks

    Preserving privacy of an individual while accessing location based information from Location Based Services (LBSs) is one of the most challenging tasks as the user unknowingly reveals the personal location in this process, where the location information can be tracked continuously and can be exploited. Sometimes it is required that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Importance and Benefits of Proposed ERP Maintenance Model

    Enterprise Resource Planning (ERP) systems are identified as enterprise wide software to integrate all the business processes for organizations. Enterprise Resource Planning (ERP) maintenance and upgrade activities are receiving much attention in ERP-using organizations. Still Many organizations lack experience and expertise in managing ERP maintenance and upgrade effectively. One of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey on Privacy Preserving Data Mining

    The increasing use of data mining tools in both the public and private sectors raises concerns regarding the potentially sensitive nature of much of the data being mined. The utility to be gained from widespread data mining seems to come into direct conflict with an individual's need and right to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Digital P2P Reputation System Using Self Certified Cryptographic Exchanges

    The main reason behind the success Peer-To-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems is not a feasible solution for P2P networks to store peer reputation information. Though a centralized system does exist, it...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Analysis of a Hybrid Cipher Algorithm for Data Encryption

    Block and stream ciphers can be joined in order to obtain hybrid algorithms and the main idea of combining can be enhancing the security of the cipher. This paper is presented to illustrate a hybrid algorithm created by combining a block cipher algorithm, TripleDES (ECB mode) and a stream cipher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Wireless Sensor Network & Security Attack Analysis

    The materialization of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning separately, and in many cases, without access to renewable energy...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    The Ten Ingredients of Data Base Systems for Improving Performance and Their Review Leading to Research Problems

    In this paper, the authors survey, consolidate, and present the state of the art in database system and they try to specify the most important research possibilities in the data bases. The heart of their analysis is a survey on basic to advanced concepts and their relativity which will give...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Maintenance Management to Improve Productivity

    The role of maintenance is very important in the successful operations of continuous process plants like power, chemicals and fertilizer plants. Maintenance is a line function and it is based on systems developed to cover day to day breakdown maintenance, planned maintenance, preventive and predictive maintenance. Computers are integral part...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Performance Analysis on Channel Assignment Scheme in Mobile Networks

    This paper presents a general framework for a wide range of Call Admission Control (CAC) algorithms. For several CAC schemes, which are a subset of this general framework, an analytical performance evaluation is presented for a mobile wireless network. These CAC algorithms consider a variety of mechanisms to prioritize traffic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Increase Sensor Network Tenure by Captive Genetic Algorithm Method

    In sensor networks the nodes have limited energy, so it is critical to the save the energy of the nodes and thus the overall energy consumption of the network. This is necessary to increase the tenure of the entire network. In this paper the genetic algorithm and simulated annealing algorithms...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Fault Tolerance and Retrieval in MPLS Network

    Multi Protocol Label Switching (MPLS) is an evolving network technology that has been used to provide Traffic Engineering and high speed networking. Uninterrupted transmission in case of failure is a major concern in MPLS based networks. The path protection is an effective method for uninterrupted transmission. Existing approaches towards the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Review of Mobile Grid Computing and Its Architecture Classification

    The concepts of grid computing and mobile computing are the emerging trends in computer science and the advances are going in this filed hand in hand. The paper here discusses how the grid computing can be implemented in wireless mobile devices to work it as a single concept of mobile...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Call Admission Control Scheme in Wireless Mobile Network

    An important issue in the operation of a cellular telephone system is how to efficiently use the available band width to provide good service to as many customers as for civil. This application demand and allocation could lead to congestion if the network has to maintain such high resources for...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    A Survey of Proactive Multicast Routing Protocols for Mobile Adhoc Network

    Mobile ad hoc network is a recently emerging branch of wireless communication technology. In such dynamic wireless network selection of the appropriate best efficient routing protocol among the large number of available protocols, as per the network requirement is a major challenge. This paper mainly has its focus on a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Apr 2012

    Knowledge Based Decision Support System for Standardization in Professional Education

    Professional Education is a Global Issue, every country in each continent is striving hard to earn as much professional growth possible. Particularly, in India the professional education has taken grip in last 10 odd years. But being a young fellow in to this new setting, there is a requirement of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Routing Optimization Using Genetic Algorithm in Mobile Ad Hoc Network

    Mobile ad-hoc networks usually consist of mobile battery operated computing devices that communicate over the wireless medium and they have limited battery capacity. In this the author have proposed protocol provides secure and adaptive backup routing protocol for MANET. Genetic Algorithm (GA) is used to find the optimal path from...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Load-Balancing Data Gathering Tree for Wireless Sensor Networks

    Recent developments of technology have enabled Wireless Sensor Networks (WSNs) to sense data from an area of interest. The sensed data aggregate and transmit to the base station (sink), where the collected data is further process for end-user queries. Since the nodes has limited power, energy efficient data gathering technique...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    An Active Star Topology and Token Ring for Fault Detection and Improvement in CAN

    The Controller Area Network (CAN) is a field bus that is now-a-day widespread in distributed embedded systems due to its electrical robustness, low price, and deterministic access delay. However, its use in safety-critical applications has been controversial due to dependability limitations, such as those arising from its bus topology. In...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Selfish Routing

    There are, in theory at least, different ways for routers to find faster routes. According to Dr. Roughgarden and Dr. Tardos call ''Selfish routing'' might indeed speed up the journeys of some data packets. Routers could send test packets in different directions to determine the swiftest path to the destination...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Motivate Coopration in Mobile Ad-Hoc Network by Giving Punishment to Misbehavior Nodes in DSR

    A mobile ad hoc network is a wireless network formed by some nodes in a self-organized way without relying on any established infrastructure or centralized administration. Since all services essential to the operation of the network are assumed to be provided by the nodes themselves, the functioning of mobile ad...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Security Provisioning for Mobile Host in Cloud Computing

    Today, the people have the ability to utilize scalable, distributed computing environments within the limits of the Internet, using a practice known as Cloud Computing. This phenomenon is generating a lot of interest worldwide because of its lower total cost of ownership, scalability, competitive differentiation, reduced complexity for customers, and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    On-Demand MANET Routing Protocols Performance

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad hoc network and is a self configuring network of mobile routers connected by wireless links. On-demand routing protocol is another family of routing protocol for mobile ad hoc network. In on-demand protocols source node requires a route to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Maximizing Lifetime of Cluster-Based WSN Through Energy-Efficient Clustering Method

    One of the important issues in wireless sensor network is inherent limited battery power within network sensor nodes. Minimizing energy dissipation and maximizing network lifetime are important issues in the design of sensor networks. There are various routing protocols like flat routing protocols, location-based, QoS based, hierarchical routing, etc. in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Attack Patterns for Black Hole, Gray Hole and Worm Hole Attack on Adhoc Networks

    Attacks by malicious nodes on authentic communicating nodes in an ad hoc network scenario are sometimes severe. Based upon the types of attacks, throughput of the network suffers in different ways. Finding out the attack patterns or the signature from the observed throughputs over times is necessary for protection of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Congestion Control and Load Balancing at Central Node in Optical Networks

    Routing in networks is a challenging issue due to inherent constraints such as power, memory, and CPU processing capabilities. In this paper, the authors assume an All to All communication mode in an N ? N grid optical network. They explore routing algorithm which balances load in the optical network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Modeling of Web Architecture (Real Time System): Online Voting Using Smart Card

    As per the current voting system in India, a voter has to go to voting booth in his constituency to cast a vote. He/she is identified by an id-card issued by the election commissioner. But problem arises when one has to move out to another place other than his constituency...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Integrating Encryption Security Pattern in Network Communication

    Web services send and receive plaintext messages over standard internet protocols. Such plaintext messages can be intercepted by an attacker and potentially viewed or even modified for malicious purposes. By using message protection, the authors can protect sensitive data against threats such as eavesdropping and data tampering. In this paper,...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    A Review on Languages Used for Mobile Agents

    In this paper the authors describe the term mobile agent. What are the different types of mobile agents? There are many different languages which have been used to implement mobile agents. The characteristics that make a language useful for writing mobile agents are: their support of agent migration, their support...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    An Optimized Handover Scheme for WIMAX

    WiMAX is a Broadband Wireless Access (BWA) scheme based on IEEE 802.16. This technology aims at providing last mile access to internet and data services. IEEE 802.16d standard provides fixed wireless access and IEEE 802.16e (Mobile WiMAX) standard supports mobility. Mobile WiMAX supports handover which can be considered as a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    To Improve TCP Performance in Mobile Ad Hoc Network

    Transmission Control Protocol (TCP) is a reliable end-to-end protocol which is widely used in wired network. In the next generation heterogeneous network, the performance of TCP is not suitable. Since some new characters are in the new situation. Like long delay, high Bit Error Rate (BER), asymmetric channels, handover, dynamic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    MediCloud: A Novel Cloud-Based Framework for Healthcare Applications

    The healthcare system is increasingly collaborative, where a broad range of healthcare services are provided by many individuals and organizations. The use of computers in healthcare can greatly enhance the quality and effectiveness of health care services while at the same time reduce cost. Disparate computing resources can be integrated...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Mobile Cloud Computing (A Review Study)

    Mobile cloud computing has been worldwide accepted as a concept that can significantly improve the user experience when accessing mobile services. Its application has become more popular all across the world. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing new integrated levels...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Implementing Visual Cryptography and Biometrics for Improved Stego Image Security

    The main idea of this paper is to apply the Biometric template Encryption (encryption using biometric template) along with Visual cryptography to secure the authors' valuable stego images. In the proposed scheme visual cryptography is applied to the stego image to get the image divided into parts and each part...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Field Programming Oriented Secured Speech Communication Using Watermark With Multiple Domain Analysis

    This paper presents a FPGA (Field Programmable Gate Array) based speech signal communication system. The system consists of encryption and watermarking. To facilitate fast operation and reduced data size, the sampled signal is compressed before operation. There are many encryption techniques available for encryption. But for real-time signal encryption, fast...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    GSM and ICT Framed e-Governance Incorporated With Network Protection

    E-governance escalation and divine service begins from the easy dissemination and easy access from the citizen to the governmental information, passes through the electronic transactions between the citizen and the public organization, and reaches to the electronic delivery of the requested document by the public organization to the citizen. An...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Real-Time Speech Signals for E-Wallet Using Watermarking Algorithm With Fast and Highly Secured Encryption

    This paper presents a watermarking technique with fast encryption and compression. Recently a number of algorithms exist for watermarking and encryption. Their drawbacks are size, security and time for execution. Compression is necessary to maintain size small where bandwidth and storage capacity is limited. A loss-less compression technique is used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Adaptive Modulation Techniques for Improving BIT Error Rate Performance of Cognitive Radio Network

    This paper examines the benefits of using adaptive modulation in terms of spectral efficiency and probability of bit error for cognitive radio networks. In channels that fluctuate dynamically over time, systems that are based upon the conventional methods of fixed modulation formats do not perform well. Adaptive modulation provides many...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Analysis of Quality of Service in Flexi Base Transceiver Station Environment

    In these days wireless communication systems are well-liked due to its wide range of advantages. The communication path between the transmitter and the receiver in wireless communication can vary from simple Line Of Sight (LOS) to one that is rigorously obstructed by buildings, mountains and shrubbery. This paper shows the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Analysis and Characterization of Intercarrier Interference of Multicarrier CDMA System

    The future wireless mobile communication systems will be required to support high-speed transmission rate. Direct Sequence Code-Division Multiple Access (DSCDMA) and MultiCarrier (MC- CDMA) are two important CDMA schemes for high rate wireless communication. Multi-Carrier Code Division Multiple Access (MCCDMA) has been considered as a strong candidate for next generation...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Spoofing Media Access Control (MAC) & Its Counter Measures

    The IEEE 802.3 MAC Protocol is the standard for LAN Ethernet Card in Computer Architecture. An adversary can exploit this vulnerability of 802,3 Protocol to launch a large number of attacks. When computers connect together on a network, a network card or wireless network card are typically used. Each network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Parent Selection Cluster Based Algorithm for Wireless Sensor Network

    In this paper, the authors propose a Parent sElection Cluster based Algorithm (PECA) for improving the sensor network lifetime. PECA achieves a good performance in terms of lifetime by balancing the energy load among all the nodes. One way to support efficient communication between sensors is to organize the network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Modified Minimum Maximum Battery Cost Routing Protocol for Mobile Ad Hoc Networks

    Nodes in mobile ad hoc networks are constrained by limited battery power for their operation. In the existing energy efficient routing protocols, such as Minimum Battery Cost Routing (MBCR) and Minimum Maximum Battery Cost Routing (MMBCR), the total transmission powers of nodes in a given route is considered and a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Comparative Analysis of Design & Development of Various Equalization & Diversity Techniques for MIMO System

    The effect of fading and interference effects can be combated with equalizer for a MIMO system. MIMO systems exploit the multipath propagation in rich scattering environment using multiple transmit and receive antennas to increase the capacity of a link. The matrix channel plays a pivotal role in the throughput of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Data Mining-The Essence of Strategic Management

    In the emerging field of data mining as the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Technically, data mining is the process of finding correlations or patterns among dozens of fields...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Performance Analysis of TFMCC

    Increasing popularity of real time traffic application has lead to increase in non TCP traffic over the internet. These non TCP applications does not provide adequate congestion control compared to TCP application sharing same network thus available bandwidth is shared unfairly and may lead to stall of TCP traffic. Many...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Data Collection Privacy Protocol With K-Anonymity Framework in Multirelational Databases: Theoretical Analysis

    Data mining is the task of extracting knowledge from large amount of data. While applying various data mining algorithms to the data it is necessary to preserve the privacy of an individual. Due to privacy concern collecting data from different parties become difficult. The problem of privacy is very common...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Design and Implementation of High Performance Transfer Protocol

    Efficient and reliable communication is essential for achieving high performance in a networked computing environment. Limited network resources bring about unavoidable competition among in-flight packets, resulting in network congestion and, possibly, deadlock. The effectiveness of deadlock handling mechanisms in a network often determines the upper bound in the throughput and...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Challenges of Dynamic Load Balancing of Association Rule Mining Algorithms in Distributed Computing Platform

    Decrease in hardware costs and increase in computer networking technologies have led to the exponential growth in the use of large-scale parallel and distributed computing systems. One of the biggest issues in such systems is the development of effective techniques/algorithms for the distribution of the processes/load of a parallel program...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Enhancement OLAP Via Fragmentation

    The two terms Data Warehouse (DW) and On-Line Analysis Processing (OLAP) technology are the backbone of the Decision Support System (DSS) and also many of others applications. Working to discover important information and appropriate depending on the analyzing results of the multidimensional database. In this paper it will be used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Chaos: The Common Cause of Data Warehousing Project Failures

    Data warehousing project failures not appropriate for managing every situation or even every kind of project. Project management does apply to great many situations. It is not only in large scale infrequent undertakings that project management applies. Its in all kinds of smaller more frequent activities as well. As long...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2011

    Resource Management on Private Cloud Using Predictive Algorithm

    Currently existing cloud service providers require users to manually manage their instances which asks for constant monitoring. The authors propose SLA Aware Resource Management service wherein resources are scaled-up or scaled-down on demand and a fair user policy is implemented by placing a cap on the number of instances that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Research Directions in Intrusion Detection, Prevention and Response Systems -A Survey

    With the advances in network based technology reliable operation of network based systems is very important. The ability to detect intruders in computer systems is important as computers are increasingly integrated into the systems that the people rely on. Internet security is a critical factor in the performance of an...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    3D Face Recognition Using Radon Transform and PCA

    Three Dimensional (3D) human face recognition is emerging as a significant biometric technology. Research interest into 3D face recognition has increased during recent years due to availability of improved 3D acquisition devices and processing algorithms. A 3D face image is represented by 3D meshes or range images which contain depth...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Multimodal Biometric Based Person Authentication System Using Fisher Linear Discriminative Analysis (FLDA) Algorithm

    Biometric system allows automatic person recognition based on physical or behavioral features which belong to a certain person. Each biometric feature has its limits and no biometric system is perfect so unimodal biometric system raise a variety of problem and the experimental studies show that unimodal biometric systems had many...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Improving Semantic Web Service Composition Performance Using Apriori Algorithm

    There are many usages for the web services in the World Wide Web. For creating new services the people can compose other developed services in the way the people want to use them. The large amount of web services make composing of services a time consuming and impossible job. So...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2012

    Performance Analysis of Convolutionaly Coded MC-CDMA System Using Modulation Techniques

    Orthogonal Frequency Division Multiplexing (OFDM) has recently gained a lot attention and is a potential candidate for Fourth Generation (4G) wireless systems because it promises data rates up to 10Mbps. A variation of OFDM is Multi-Carrier CDMA (MC-CDMA) which is an OFDM technique where the individual data symbols are spread...

    Provided By International forum of researchers Students and Academician