International forum of researchers Students and Academician

Displaying 281-320 of 553 results

  • White Papers // Jul 2012

    Design and Implementation of Artificial Neural Network Architecture for MANET on FPGA Platform

    This paper presents and FPGA implementation of Artificial Neural Network (ANN) is applied in Wireless Ad-Hoc NETwork (WANET) for the performance optimization of Routing protocol and its Hardware implementation using Field Programmable Gate Arrays (FPGA). Artificial Neural Network is designed using MATLAB and its digital architecture implementation is described using...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Software Architecture for Implementing Efficient Power Management Techniques Within Intelligent TAGS

    Power consumption has become a serious issue in the development of remote mobile devices such as intelligent tags where charging and recharging of the battery cannot be done frequently. Longevity of the battery has to be increased by power saving. Many existing techniques address the issue of power management in...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A Study on Traceability and Human Factors in Agile Practices to Improve Software Quality

    The most noticeable change to software process thinking in the last few years has been the appearance of the word 'Agile'. Agile software development methods were invented to minimize the risk of developing low quality software systems with rigid process-based methods. They impose as little overhead as possible in order...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Cloud E-Learning: A New Virtuous Business Archetype for E-Learning

    Now-a-day, most of predominant education system are becoming not being suitable for necessities of social improvement and educational development and not being able to catch up with the changes of learning demand in time, thus computer networks have brought opportunities for it. In conventional web based E-learning approach, system assembly...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Customizing and Porting of UClinux on Reconfigurable SoC

    Today's reconfigurable hardware devices have huge densities and are partially reconfigurable, allowing for the configuration and execution of hardware tasks in a true multitasking manner. This makes reconfigurable platforms an ideal target for many modern embedded systems that combine high computation demands with dynamic task sets. Such an operating system...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    FPGA and ASIC Implementation of Vedic Multiplier

    The ever increasing demand in enhancing the ability of processors to handle the complex and challenging processes has resulted in the integration of a number of processor cores into one chip. Still the load on the processor is not less in generic system. This load is reduced by supplementing the...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Connectivity-Based Localization Schema for Wireless Sensor Network

    In this paper, the author examines localization error will be minimal after adjusting the radio range of beacons' and error performance tradeoffs. Anchor based-range-free schema for Wireless Sensor Network. Localization algorithms are different in different network environments. His work is to find out an efficient localization algorithm for Wireless Sensor...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    A CDMA Cellular Network Base Station Distributed Closed-Loop Power Control Algorithm Based on Sixteen-Iterations

    All users transmit on the same frequency and time and utilize the entire bandwidth in CDMA compared to TDMA or FDMA. Even though CDMA provides more capacity and better QoS, the capacity is affected by the near-far problem which degrades the performance of users far away from the BSs. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    On Dynamic Configurability and Adaptability of Intelligent Tags with Handheld Mobile Devices

    The availability of unlicensed spectrum coupled with the increasing popularity of wireless communication has given rise to wide range of wireless technologies. The overwhelming success of mobile devices and wireless communications is stressing the need for the development of wireless mobile application services. Device mobility requires services adapting their behavior...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Hiding Text in Audio Cover with the High Capacity and Security Using Multiple LSBs

    Stenography is an art of embedding hidden data or secret messages over a public channel so third party cannot detect the presence of secret messages. In this stenography method of embedding textual information in an audio file, a proposed technique is first audio sampled and then appropriate bit of each...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Architecture of Data Warehouse ETL Tools- Performing Efficient and Effective Way

    Data warehousing has been a buzz word in the industry since mid 90's, but it was not wide spread due to be complex timing and maintenance. Business and technologies are now wider and wider so in modern technologies users cannot think in any organization without data warehouse. Data warehouse helps...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Wi-MAX Security Enhancement and Solution for Authentication Against Man-in-the-Middle Attack

    The paper presents security enhancement of Worldwide Interoperability for Microwave Access (WiMAX) for authentication frame work in IEEE 802.16 against man-in-the-middle attack. This gives secure authentication of legitimate Mobile Station (MS) and protects man-in-the-middle attack. To prevent this kind of attack and to make the authentication more secure, a Hash-Random...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Stability of Feedback Based LNA Topologies for UWB Communication

    Since the U.S. Federal Communications Commission (FCC) approved the application of Ultra Wide-Band (UWB) technology for commercial use in early 2002, ranging from 3.1 to 10.6 GHz (bandwidth: 7.5 GHz), the implementation of a UWB system and its sub-blocks has been a challenge for Integrated Circuit (IC) designers. In this...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Gallium Nitride-Based RF Power Amplifiers for Future Wireless Communication Systems

    Radio Frequency (RF) High Power Amplifiers (PAs) received increasing attention as key components responsible for a sizable portion of base station cost (power loss and cooling equipment) in wireless communication systems. Thus, high power and high efficiency amplifiers with low power loss are critically needed. To meet these requirements, higher...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Realization of the SISO Architecture for Downlink Data Channels of 3GPP-LTE Using PlanAhead Tool and Virtex-5 Device

    Long Term Evolution (LTE) of UMTS Terrestrial Radio Access and Radio Access Network is a Fourth Generation wireless broadband technology which is capable of providing backward compatibility with 2G and 3G technologies. As compared with other promises LTE is able to deliver high data rate and low latency with reduced...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    MANET Based Emergency Communication Module for Post Disaster Recovery

    In recent years, the world has experienced a number of catastrophic natural disasters such as earthquake, hurricane, typhoon, tsunami, etc. The victims trapped in the collapsed buildings and landslides will have a great chance of survival in case the rescue team reaches for help in a short period of time....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Link Failure Tolerance by Path Restoration

    Due to channel interference, dynamic obstacles and/or applications' bandwidth demands multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures. This results performance degradation in WMNs and require expensive, manual network management for their real-time recovery. Herewith the authors present an Autonomous network Reconfiguration System (ARS) that enables a multi-radio WMN...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jul 2012

    Comparative Study for Quadruple Tank Process with Coefficient Diagram Method

    In this paper, a new decoupler method using Coefficient Diagram Method (CDM) for quadruple tank process is proposed. It consists of four inter connected water tanks and two pumps. The major problem in a multivariable process is that the loop interaction may arise and cause difficulty in feedback control design....

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    ARM Based Vehicle Tracking and Security Using GPS and GSM

    A low cost GPS and GSM based vehicle tracking system is developed using ARM processor for real time application. The main core of the system is an embedded hardware along with embedded C compiler. GPS gives the location of the vehicle and also embedded device communicates with GSM network which...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Verilog Implementation of Elliptic Curve Cryptosystem (ECC)

    Data Encryption is widely used to ensure security in open networks such as the internet with the fast development of cryptography research and computer technology. The capabilities of cryptosystems such as of RSA & Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on Elliptic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Implementation of Software-Defined Radio Using Lab VIEW

    A software-defined radio consists of a programmable communication system where functional changes can be made by merely updating software. In this paper, a software-defined radio 4-QAM (Quadrature Amplitude Modulation) modem system is implemented in LabVIEW. LabVIEW is a widely used graphical programming environment which allows designing systems in an intuitive...

    Provided By International forum of researchers Students and Academician

  • White Papers // Jun 2012

    Off-Line Signature Verification and Recognition

    Signatures are composed of special characters and flourishes and therefore most of the time they can be unreadable. Also intrapersonal variations and interpersonal differences make it necessary to analyze them as complete images and not as letters and words put together. As signatures are the primary mechanism both for authentication...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Advanced Vehicle Positioning and Secured System

    This paper discussed a kind of design of vehicle location system based on ARM. The architecture and working theory of this system is introduced in details, and introduces the vehicle location system which uses the ARM microprocessors LPC2129 as a control unit to combinative with GPS LR9548 and GSM TC35...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    VLSI Implementation and Analysis of Cryptographic Algorithms for RC5 and Triple Data Encryption Standard

    In an age of technological advancements, security and privacy plays an important role in the day-to-day communications. With the advent of the internet, data security has become a topic of utmost importance. Through this paper, the authors wish to address this concern by carrying out a comparative analytical study of...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Enhance DataBase Performance With Clustering Algorithm

    Clustering, in data mining is useful for discovering groups and identifying interesting distributions in the underlying data and to fast query processing. Traditional clustering algorithms favor clusters with either spherical shapes or with similar sizes. The traditional algorithms are very fragile in the presence of outliers. The authors propose clustering...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Dynamic Clustering Approaches to Accord Updates in the Data Warehouse

    Data warehouses form the basis for performing data mining tasks such as classification and clustering. A data warehouse is constructed from multiple databases. Whenever the databases are updated, they are not immediately applied to the data warehouse. Typically updates are collected and applied to the data warehouse periodically. Then all...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    3D Face Recognition Using Radon Transform and PCA

    Three Dimensional (3D) human face recognition is emerging as a significant biometric technology. Research interest into 3D face recognition has increased during recent years due to availability of improved 3D acquisition devices and processing algorithms. A 3D face image is represented by 3D meshes or range images which contain depth...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Multimodal Biometric Based Person Authentication System Using Fisher Linear Discriminative Analysis (FLDA) Algorithm

    Biometric system allows automatic person recognition based on physical or behavioral features which belong to a certain person. Each biometric feature has its limits and no biometric system is perfect so unimodal biometric system raise a variety of problem and the experimental studies show that unimodal biometric systems had many...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Improving Semantic Web Service Composition Performance Using Apriori Algorithm

    There are many usages for the web services in the World Wide Web. For creating new services the people can compose other developed services in the way the people want to use them. The large amount of web services make composing of services a time consuming and impossible job. So...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Steganography on Android Based Smart Phones

    Steganography is an old technique to hide data into resources. In this paper, the authors have explained how this technique can be used in android based smart phone. The paper includes basics of image representation, limitations of Smartphones like android, other alternatives and implementation on android. There are some limitations...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    GI-FI (A New Wireless Technology)

    The paper presents the review about GI-FI which is a new wireless technology. GI-FI will help to push wireless communications to faster drive. For many years cables were used as a medium of communication or data transfer. Optical fibres played a dominant role for its higher bit rates and faster...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Clustered Caching Based Scheme for SOA to Improve Reliability, Scalability and Data Availability

    The service-oriented architecture has come a long way in solving the problem of reusability of existing software resources. Grid applications today are composed of a large number of loosely coupled services. While this has opened up new avenues for building large, complex applications, it has made the management of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Cloud Computing the Way Ahead

    Cloud computing is the latest technology through which a new dimension of computing is going to be unfolded. It has changed the way computing is done and is being seen by everyone including world's top computer experts and MNC's. It emphasizes more on the way of doing then how to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    GWT Javascript Complier Support for Building Debuggable and Desktop-Like Web Applications

    The Google Web Toolkit (GWT) is an open source framework that makes building rich Internet applications (high-performing, interactive, AJAX applications) easy for Java developers. Instead of using the HTML, DHTML, JavaScript language (which is powerful, but lacking in areas like modularity and testing features, making the development of large-scale systems...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    A Simple Network Adapter Simulation on EML Layer for Optics Management System

    Simple network adapter initially which acts as an interface between the transaction server and network elements communicates over the channel through TCPPDU. Presently the disadvantage being involved in TCPPDU is to maintain the channel contention, reservation of channel bandwidth. The disadvantage being involved is certain features, version of network elements...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Wireless Multi-Purpose in Intelligent Home Based on SMS and Email With the RFID Technology

    In this paper, the authors provide home appliance control, security and health care systems. The system is Short Message Service (SMS) and Email based Smart and Security with the Radio Frequency IDentification (RFID) technologies. The system uses Global System for Mobile communication technology (GSM) and Web thus providing ubiquitous access...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    MSOPS - Manage and Secure Optical Networks by Simulation of Network Elements

    During the development of a Network Management System (NMS), it is imperative to test the system with the actual Network Element (NE). However, this is not feasible, as the equipment may be unavailable during the development cycle or NE may have to be physically laid throughout the globe in order...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    IEEE 802.15.4 Based Embedded Wireless Monitoring and Recording of Environmental Parameters

    To create a wireless environmental parameters recording system that can benefit from the continuous advancements being made in embedded microcontroller and communications technologies. Architecture for continuous wireless environmental monitoring has been designed, fabricated, and tested. The system consists of Commercial-Off-The-Shelf (COTS) wireless-enabled module and components for communicating the temperature, humidity,...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    An Improved-SPIN Protocol for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN) data transmission is one the major challenges and a number of routing protocols have been proposed to cope up with this problem by saving energy during transmission. Routing protocols that performs in-network aggregation are best suited for this purpose to yield energy saving data transmission....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2012

    Common Radio Resource Management for Heterogeneous Wireless Network

    A major challenge of the heterogeneous network is the Radio Resource Management (RRM) strategy. Common RRM (CRRM) is proposed to jointly manage radio resources among different Radio Access Technologies (RATs) in an optimized way. Heterogeneous wireless systems are envisaged as the integration and joint cooperative management of diverse radio access...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Data Collection in WSN Using Randomized Dispersive Routes

    In this paper, the authors define the problem to provide security to the network having intruders and reconstruction of original information using Shamir's secret sharing algorithm. The proposed system secure data collection in a Wireless Sensor Network with compromised nodes in order to circumvent or overcome the 'Black Holes'. It...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Distinct User Identification Method Using Web Log data

    With the Internet usage gaining popularity and the steady growth of users, the World Wide Web has become a huge repository of data and serves as an important platform for the dissemination of information. The users' accesses to Web sites are stored in Web server logs. However, the data stored...

    Provided By International forum of researchers Students and Academician

  • White Papers // Nov 2012

    A Review on Data Security in Data Warehousing

    Data Warehouses are used for storing historic and current data and are used for creating trending reports for annual and quarterly comparisons for the enterprises. Data Warehouses are the most valuable assets which contains critical business data and information for the enterprises in today's world. Most of the existing data...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Survey on Data Mining in Cloud Computing

    Data and information has a significant role on human activities, thus data sources are growing to be larger and distributed. But the main problem is not storing data; it is analyzing, mine, and process data for understanding it. Current era is of networking and communication; people are interested in keeping...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    An Approach for Enhancement of Data Security in Cloud Computing-A Review

    Cloud computing is an emerging trend which can transform information technology and the way it is used. The main issue is data security as it should not be a concern over the large data to be shared in cloud and hence not limit its use. This is a review of...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Optimized Data Warehouse Model Through Pentaho ETL Tool

    Extraction-Transformation-Loading (ETL) tools are available for the extraction of data from several sources, their cleansing, customization and insertion into a data warehouse. In this paper, the authors have focus on how to build optimized data warehouse model through Pentaho ETL tool. Initially they have taken data set that is given...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Indoor Location Determination by Using RFIDs

    With the Growing usage of smart software that uses the location information, automatic location sensing became a necessity in everyday life. There is the Global Positioning System (GPS) which is a satellite based navigation system made up of a network of 24 satellites placed into orbit. GPS is widely used...

    Provided By International forum of researchers Students and Academician

  • White Papers // Feb 2013

    Routing in Manets

    A Mobile Ad-hoc NETwork is a collection of mobile nodes forming an ad-hoc network without the assistance of any centralized structures. These networks introduced a new art of network establishment and can be well suited for an environment where either the infrastructure is lost or where deploying an infrastructure is...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Secure Multiparty Computation Using Homomorphic Encryption

    Secure multiparty computation has become most popular research now days. Multiple parties want to perform a function with the data possessed by each party without disclosing the data to each other and without the involvement of a trusted third party. This paper deals with the computation of sum of n...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Exploration of Three Dimensional Codes Based on Model A and Model B Using Algebraic Congruent Operator in OCDMA System

    Algebraic congruent codes utilizes congruent operators within the Galois field to obtain the address sequences of different users for OCDMA system. With same or different operators, different sequences could be generated based on model A and model B, such as prime sequences, quadratic congruent sequences, hyperbolic congruent sequences, and cubic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Security in Wireless Sensor Network With Broadcast

    Wireless Sensor Networks (WSN) is an emerging technology and day-by-day it is attracting the attention of researchers with its challenging characteristics. The more researchers try to develop further cost and energy efficient computing devices and algorithms for WSN, the more challenging it becomes to fit the security of WSN. Security...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    HALARM: Heterogeneous Alarm to Withstand DOS Attacks

    Data mining based information processing in MANET is at its entering stage, as compared to traditional machine learning and MANET. Currently, researches mainly focus on applying machine learning techniques to solve a particular problem in MANET. Different researchers will have different assumptions, application scenarios and preferences in applying machine learning...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Biased and Secured Time Synchronized Protocol for Wireless Sensor Networks

    In a wireless sensor network a large number of sensors are deployed for the purpose of sensing and bring the data back securely to nearby base stations. The base stations then perform the costly computation on behalf of the sensors to analyze the data sensed by the sensors. Due to...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Cookies Based Intrusion Attacks and Detection Techniques Over DRDOS Attack

    Network introduces security problems, threats, risks and other types of attacks like internal and external attack. DoS is the most debilitating attack in the Internet and yet it still remains an open research topic. Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing mass targeted...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    A Generalized Call Admission Control Scheme for Overflowed Traffic in Multilayer 3G Wireless Mobile Networks

    Multilayer cell structure has become a major trend in the design of 3G wireless mobile networks in order to support the high capacity demand required for various types of traffics in 3G systems. In this type of network an efficient call admission control scheme is required to improve the Quality...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparative Analysis of Energy Consumption in Various Routing Protocol for Mobile Ad Hoc Network

    An ad-hoc network is the cooperative engagement of a collection of mobile hosts without the required intervention of any centralized access point. In this paper, the authors present an innovative design for the operation of such ad-hoc networks. The design of efficient routing protocols is a fundamental problem in a...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Parallel Searching Algorithm on Hypercube Interconnection Network

    In the information age, the huge amount of data and information are exchanged which requires fast and efficient searching mechanisms for effective use of this information. There are various sequential searching algorithms to search an element in an unsorted array or sorted array of elements. A number of researchers have...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Systematic Approach for Estimation and Evaluation of Software Metrics

    In Software industry, success of any organization is depends on how good they estimate actual effort and size of the software. Software cost estimation is the process of predicting the effort required to develop a software system. The selection of model for estimation is the most critical process for organization....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Overview of Anonymous Routing Protocols to Overcome Passive Attack in Mobile Ad-Hoc Networks

    With the wide use of mobile devices in mobile ad hoc networks, maintaining anonymity is becoming an increasingly important issue. Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Evaluation and Modification in Partition Based Clustering Techniques

    Powerful systems for collecting data and managing it in large databases are in place in all large and mid-range organizations. The value of raw data(collected over a long time) is on the ability to extract high-level information: information useful for decision support, for exploration, and for better understanding of the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Scalable and Efficient Key Management in LAN

    As LAN has some limitations, pre-distribution of secret keys is possibly the most practical approach for secure network communications. In this paper, the authors propose a key management scheme based on random key pre-distribution for LAN. As large-scale networks suffer from high costs of communication, computation, and storage requirements, the...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    QOS Parameter Analysis on AODV and DSDV Protocols for MANETS

    QoS (Quality of Service) is rapidly growing area in MANETs the authors mean a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the wireless network...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    MATLAB Based Enhanced System for Online Data Acquisition and Processing of Iris

    Biometrics refers to the automatic identification and authentication of individuality of a human being based on their iris data, retina data, face structure, voice, finger prints, etc. Biometrics basically consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Nowadays iris detection and...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Biometrics in Mobile Security

    The term Biometrics is a combination of word bio and metrics. Bio means life and metrics means measurement. Biometrics means the measurement of unique human characteristics for recognition of an individual by measuring fingerprints, face, signature, voice of combination of all these. Today, biometrics is widely used for mobile security....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Challenges and Associated Mitigations in Providing QoS Support to MANET

    Mobile Ad hoc NETworks (MANET), which Comprise of mobile nodes connected wirelessly, are emerging as a very important technology for future generation of wireless mobile and ubiquitous computing. To support real-time communications (i.e., audio and video) over MANETs, Quality of Service (QoS) provisioning mechanisms need to be developed. QoS is...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Tiny MAC for Message Authentication in Constrained Resource Network Environments

    Security is an important concern in any modern network. However, networks that are highly dependent on constrained devices (such as sensors, tokens and smart cards) impose a difficult challenge: their reduced availability of memory, processing power and specially energy hinders the deployment of many modern cryptographic algorithms known to be...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    An Efficient Round Robin CPU Scheduling Algorithm

    The main aim of this paper is to propose a new approach for round robin scheduling which helps to improve the performance of CPU in real time and time sharing operating system. Existing CPU scheduling algorithm cannot be implemented in real time operating system due to their high context switch...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Comparison of Position Based Routing Protocol and Topology Based Routing Protocol in VANET

    The Vehicular Ad hoc NETwork (VANET) is an emerging new technology. Which will make the life easy VANET is one of the influencing areas for the improvement of Intelligent Transportation System (ITS) in order to provide safety and comfort to the road users. Besides safety applications VANET also provide comfort...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Survey of Black Hole Attack and Its Solutions in Mobile Adhoc Networks

    MANETs are infrastructure less network. It is difficult to design robust security solutions for MANETs. In MANETs, nodes themselves do routing and forwarding functions. Sometimes, nodes show selfish behavior and do not forward packets of other nodes. This is known as black hole attack. It results in reduction in network...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2012

    Effective Synthesis of Health Science and Telemedicine by Using Body Area Network

    Body Area Networks (BANs) are wearable wireless sensor networks with a high potential for medical and sports applications. A body area network is formally defined as, "A communication standard optimized for low power devices and operation on, in or around the human body (but not limited to humans) to serve...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Simulation Based Comparison of BER With Different Equalizers in Multipath Fading Channel

    The term equalization can be used to describe any signal processing operation that minimizes inter symbol interference. This paper shows comparison of bit error performance with different equalizers in multipath fading channel. Here, the authors discussed various types of algorithm used in equalization and the performance played by algorithm to...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Analysis of Rectangular Micro Strip Antenna

    Micro strip antennas now a days had a wide application but unless analysis and optimization for rectangular micro strip antenna is made it is not possible to get high end performance from them. Several methods are there for to calculate the resonant frequency of a microstrip antenna using rectangular cavity...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    A Lightweight Soft-State Tracking Framework for Dense Mobile Ad Hoc Networks

    In a mobile ad hoc network, tracking protocols need to deal with - in addition to the mobility of the target - - the mobility of the intermediate nodes that maintain a track toward the target. To address this problem, the authors propose the MDQT (Mobility-enhanced Distributed Quad Tree) tracking...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    IPv6 Considered Harmful in Computer Network

    The investigation of the turing machine has developed e-business, and current trends suggest that the evaluation of lambda calculus will soon emerge. Given the current status of concurrent epistemologies, statisticians obviously desire the key unification of von Neumann machines and suffix trees, which embodies the significant principles of electrical engineering....

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Load Balancing in Grid Computing

    Computing grids are conceptually not unlike electrical grids. Grid computing uses middleware to coordinate disparate IT resources across a network, allowing them to function as a virtual whole. The goal of a computing grid, like that of the electrical grid, is to provide users with access to the resources they...

    Provided By International forum of researchers Students and Academician

  • White Papers // May 2011

    Mobile Adhoc Networks and PTP Network

    In this paper, the authors will discuss about Mobile Ad hoc NETwork (MANET) that is also known as mobile mesh network is a wireless network that use wireless transmission for communication and do not rely on any central coordinator. They will also discuss bootstrapping of PTP network. Mobile nodes that...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    To Improve TCP Performance in Mobile Ad Hoc Network

    Transmission Control Protocol (TCP) is a reliable end-to-end protocol which is widely used in wired network. In the next generation heterogeneous network, the performance of TCP is not suitable. Since some new characters are in the new situation. Like long delay, high Bit Error Rate (BER), asymmetric channels, handover, dynamic...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    MediCloud: A Novel Cloud-Based Framework for Healthcare Applications

    The healthcare system is increasingly collaborative, where a broad range of healthcare services are provided by many individuals and organizations. The use of computers in healthcare can greatly enhance the quality and effectiveness of health care services while at the same time reduce cost. Disparate computing resources can be integrated...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Mobile Cloud Computing (A Review Study)

    Mobile cloud computing has been worldwide accepted as a concept that can significantly improve the user experience when accessing mobile services. Its application has become more popular all across the world. By removing the limitations of mobile devices with respect to storage and computing capabilities and providing new integrated levels...

    Provided By International forum of researchers Students and Academician

  • White Papers // Aug 2011

    Implementing Visual Cryptography and Biometrics for Improved Stego Image Security

    The main idea of this paper is to apply the Biometric template Encryption (encryption using biometric template) along with Visual cryptography to secure the authors' valuable stego images. In the proposed scheme visual cryptography is applied to the stego image to get the image divided into parts and each part...

    Provided By International forum of researchers Students and Academician