International Institute for Science, Technology and Education

Displaying 1-40 of 44 results

  • White Papers // Oct 2013

    Security Architecture for Tanzania Higher Learning Institutions? Data Warehouse

    In this paper, the authors developed security architecture for the higher learning institutions in Tanzania which considers security measures to be taken at different level of the higher learning institutions' data warehouse architecture. The primary objectives of the study was to identify security requirements of the higher learning institutions data...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Oct 2013

    Cloud Computing on Smartphone

    Cloud computing is the most recent technology for data storage & access. Cloud computing includes specific space on the server; the data can be accessed from or stored on the cloud. Cloud computing results into the high speed data accessed capability. Now a days, Every organization have their own cloud...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2013

    Cyber Security: Rule of Use Internet Safely

    Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Concurrency Lock Issues in Relational Cloud Computing

    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud service providers. Due to the increasing number of web applications being hosted in the cloud, and...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Cloud Security Issue and Challenges

    In past three decades, the world of computation has changed from centralized (client-server not web-based) to distributed systems and now the authors are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Survey of Current Network Intrusion Detection Techniques

    The significance of network security has grown enormously and a number of devices have been introduced to perk up the security of a network. NIDS is a retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current open...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Brief Analysis of Methods for Cloud Computing Key Management

    In this paper, basic of cloud and possible methods for its key management is discussed. Now-a-days cloud computing is good arena in the field of research. In cloud computing cloud customer and cloud provider needs to secure data against loss and theft. Encryption with key management is a technique for...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Dec 2012

    Virus Attack on Mobile Phone as an Impediment to Network Stability

    Viruses that infect cell phones especially Smartphone's are beginning to emerge as a new obverse in the fight against computer viruses. Cell phones viruses have become real as many smart phones and other modern cell phones feature Internet capability and contain storage space. Cell phones viruses can be harmful because...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    The Critical Need for Software Architecture Practices in Software Development Process

    Software architecture is the master plan of every reliable software system. It is the building block of any kind of software system which greatly determines the success of the system. This paper argues that every system needs a good architecture and that requires the use of good architecture engineering practices...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    A JADE Implemented Mobile Agent Based Host Platform Security

    Mobile agent paradigm relies heavily on security of both the agent as well as its host platform. Both of the entities are prone to security threats and attacks such as masquerading, denial-of-service and unauthorized access. Security fissures on the platform can result in significant losses. This paper produced a Robust...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    A Real-Time Filtering Method of Positioning Data With Moving Window Mechanism

    Now-a-days, advanced mobile devices can obtain current position with the help of positioning data systems such as GPS, GLONASS, Galileo, and so on. However, positioning data sets usually have erroneous data for various reasons, mainly due to the environmental issues as well as inherent systematical issues. While doing research related...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    A Study of Image Fingerprinting by Using Visual Cryptography

    As digital media has made the people life more colorful because of its advantages like easier to access, copy and distribute. But as what the authors have seen, series of malice activities like copyright infringement, counterfeiting, piracy and information distortion make damages to both the producers and the users of...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    An Efficient Scheduling Policy for Load Balancing Model for Computational Grid System

    Workload and resource management are two essential functions provided at the service level of the Grid system. To improvement in global throughput need, effective and efficient load balancing are fundamentally important. The authors also check that what type of scheduling policy is used by that algorithm, because an efficient scheduling...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    An Improvement to Trust Based Cross-Layer Security Protocol Against Sybil Attacks (DAS)

    The performance of distributed networks depends on collaboration among distributed entities. To enhance security in distributed networks, such as ad hoc networks, it is important to evaluate the trustworthiness of participating entities since trust is the major driving force for collaboration. The trust based security protocol based on a cross-layer...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Application of Computer Graphics Technique to Computer System Assembling

    Computer graphics is the representation and manipulation of image data by a computer using various technology to create and manipulate images. The development of computer graphics has made computer easier to interact with, and better for understanding and interpreting different types of data. Three-Dimensional (3D) computer graphics represent geometric data...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Study of the Topology Mismatch Problem in Peer-to-Peer Networks

    The advantages of Peer-To-Peer (P2P) technology are innumerable when compared to other systems like Distributed Messaging System, Client-Server model, Cloud based systems. The vital advantages are not limited to high scalability and low cost. On the other hand the p2p system suffers from a bottle-neck problem caused by topology mismatch....

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Integration of Java EE Applications on C - Based Implementations

    Sometimes the people may encounter a scenario in which they need to Integrate the existing Java - Based applications With the Native formats of C/C++ Based implementations For example the applications of Defense, Aerospace weather Forecasting Applications contain complex algorithms and that might be too complex And too difficult or...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Is the Cloud Educational Enterprise Resource Planning the Answer to Traditional Educational Enterprise Resource Planning Challenges in Universities?

    Universities, the new target for Enterprise Resource Planning (ERP) providers such as Google, SAP and Databiz to provide such systems in order to manage their activities in a manner that add value to information from operations and main processes. However challenges have showed to get in the way of applying...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Test Sequences for Web Service Composition Using CPN Model

    Web service composition is most mature and effective way to realize the rapidly changing requirements of business in service-oriented solutions. Testing the compositions of web services is complex, due to their distributed nature and asynchronous behaviour. Colored Petri Nets (CPNs) provide a framework for the design, specification, validation and verification...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    RFID Security Using miniDES Algorithm in Deployment of Bike Renting System

    Radio Frequency IDentification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an entity or person wirelessly, using radio waves. Unlike barcode technology, RFID technology does not require contact or line of sight for...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    Biometric Data Security Using Recursive Visual Cryptography

    Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. n-secrets...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    Secure Data Transmission by Using Steganography

    Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    An Evolutionary Approach to Optimizing Cloud Services

    Cloud computing is becoming more and more popular in organizations around the world as it allows sharing of computing resources that are distributed all over the world. It is generally used for on-demand storage and processing power. In this paper, the authors propose an optimized scheduling algorithm for cloud services....

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Sub-Terahertz Low Power UWB Communication Link for WPAN

    In this, paper, the authors proposed a Ultra-WideBand (UWB) wireless communication system for transmitting digital information in the terahertz frequency range on the basis of analog noise carrier with a low level of radiation. The digital information at the transmitter is inserted using code spectrum modulation of noise signal. The...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Look at IPV6 Security Advantages Over IPV4

    Due to the increase of Internet usage especially in homes, offices and there will be many devices that will use the new 3G/4G technologies, so Internet address exhaustion will be raised to serious problem gradually. Now-a-days, the IPv4 address shortage problem has been solved incompletely using NAT (Network Address Translation)...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Intrusion Detection Protocol for Adhoc Networks

    MANET can be viewed as collection of wireless mobile nodes that forms a short-lived network without any fixed infrastructure. In this network, all the nodes configure themselves and are free to move about arbitrarily. The dilemma is that how should it be judged whether the MANET is secure or not....

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Mobile Ad hoc Networks - Dangling Issues of Optimal Path Strategy

    Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing is a process of exchanging information from one...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Data Security Using Stegnography and Quantum Cryptography

    Stegnography is the technique of hiding confidential information within any media. In recent years, various stegnography methods have been proposed to make data more secure. At the same time different steganalysis methods have also evolved. The number of attacks used by the steganalyst has only multiplied over the years. Various...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    A New Scheme for Secured on Demand Routing

    A Mobile Ad-hoc NETwork (MANET) is characterized by mobile nodes, multi-hop wireless connectivity, non infrastructural environment and dynamic topology. A recent trend in ad-hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable routing, security and power efficiency are the major concerns in this...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    A Review of Improvement in TCP Congestion Control Using Route Failure Detection in MANET

    A Mobile Ad-hoc NETwork is an autonomous collection of mobile devices that communicate with each other over wireless links and cooperate in a distributed manner in order to provide the necessary network functionality in the absence of a fixed infrastructure. This type of network, operating as a stand-alone network or...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Providing Security to Wireless Packet Networks by using Optimized Security Method

    Now-a-days technology is growing very fast, due to rapid development of the technology in computer arena, communication through network become a habit to the users. Communication through network is happen using two channels i.e., by connection oriented and connection less. At present, users prefer wireless networks for communication and transferring...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Application-Independent Based Multicast Routing Protocols in Mobile Ad hoc Network (MANET)

    Multicasting is an efficient communication service for supporting multipoint applications. The main goal of most ad-hoc multicast protocols is to build and maintain a multicast tree or mesh in the face of a mobile environment, with fast reactions to network changes so that the packet loss is minimized. The topology...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Sans Signature Buffer Overflow Blocker

    The objective of Sans Signature buffer overflow blocker mainly is to intercept communications between a server and client, analyze the contents for the presence of executable code and prevent the code reaching the server. In this paper, Sans Signature is a signature free approach, which can identify and block new...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Detecting Cyber Attacks at Data Dribble

    In the modern era of technology, Internet information resources are actively growing, intruding many spheres of social life. Modern information technologies not only being introduced into private enterprises but also in the provision of public services. This paper proposes a new technique for detecting unauthorized network intrusions, based on a...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Measuring Round Trip Time and File Download Time of FTP Servers

    Today, Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. It has made the world a global village. It uses a layered model such as TCP/IP. Data can transfer easily using ordinary file transfer method such as HTTP and emails protocols. When to...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    A Deadlock - Free Routing Algorithm for Torus Network

    TORUS is an n-dimensional network topology. Each dimension will have k nodes. A routing algorithm determines the sequence of channels for a packet to traverse from the source to destination. A new router design that significantly reduces the main drawback of wormhole switching-latency, is presented in this paper. Worm-hole switching...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Comparison of Different Neural Networks for Iris Recognition: A Review

    Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. Among all the biometric modalities, iris has emerged as a popular choice due...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System

    The rapid development of computer networks and mostly of the Internet has created many stability and security problems such as intrusions on computer and network systems. Further the dependency of companies and government agencies is increasing on their computer networks and the significance of protecting these systems from attacks is...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2011

    Broadcasting Routing Protocols in VANET

    Vehicular Ad-hoc NETworks (VANETs) are subclass of Mobile Ad-hoc NETworks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages/disadvantages and the applications of various routing protocols for Vehicular Ad-hoc NETworks....

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2011

    Study of Load Balanced Routing Protocols in Mobile Ad hoc Networks

    Mobile Ad-hoc NETwork is a collection of wireless mobile nodes, such devices as PDAs, mobile phones, laptops etc. that are connected over a wireless medium. There is no pre-existing communication infrastructure (no access points, no base stations) and the nodes can freely move and self-organize into a network topology. Such...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Oct 2013

    Security Architecture for Tanzania Higher Learning Institutions? Data Warehouse

    In this paper, the authors developed security architecture for the higher learning institutions in Tanzania which considers security measures to be taken at different level of the higher learning institutions' data warehouse architecture. The primary objectives of the study was to identify security requirements of the higher learning institutions data...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Concurrency Lock Issues in Relational Cloud Computing

    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud service providers. Due to the increasing number of web applications being hosted in the cloud, and...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    RFID Security Using miniDES Algorithm in Deployment of Bike Renting System

    Radio Frequency IDentification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an entity or person wirelessly, using radio waves. Unlike barcode technology, RFID technology does not require contact or line of sight for...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Cloud Security Issue and Challenges

    In past three decades, the world of computation has changed from centralized (client-server not web-based) to distributed systems and now the authors are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2013

    Cyber Security: Rule of Use Internet Safely

    Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Survey of Current Network Intrusion Detection Techniques

    The significance of network security has grown enormously and a number of devices have been introduced to perk up the security of a network. NIDS is a retrofit approach for providing a sense of security in existing computers and data networks, while allowing them to operate in their current open...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    Biometric Data Security Using Recursive Visual Cryptography

    Recursive Visual cryptography takes the idea from the basic scheme of Visual cryptography to hide multiple secrets recursively in the single image. This paper proposes a scheme of recursive creation of shares using the basic scheme and embedding secrets into the shares. This results levels of share creation i.e. n-secrets...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    Secure Data Transmission by Using Steganography

    Steganography is the efficient technique to provide secure data transmission over the network, as the number of users increases effectively. The cryptography is also used to provide security to data over network, but transmission of secured message may be detectable to third party. From security point of view, steganography does...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Oct 2013

    Cloud Computing on Smartphone

    Cloud computing is the most recent technology for data storage & access. Cloud computing includes specific space on the server; the data can be accessed from or stored on the cloud. Cloud computing results into the high speed data accessed capability. Now a days, Every organization have their own cloud...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jun 2013

    Brief Analysis of Methods for Cloud Computing Key Management

    In this paper, basic of cloud and possible methods for its key management is discussed. Now-a-days cloud computing is good arena in the field of research. In cloud computing cloud customer and cloud provider needs to secure data against loss and theft. Encryption with key management is a technique for...

    Provided By International Institute for Science, Technology and Education

  • White Papers // May 2012

    An Evolutionary Approach to Optimizing Cloud Services

    Cloud computing is becoming more and more popular in organizations around the world as it allows sharing of computing resources that are distributed all over the world. It is generally used for on-demand storage and processing power. In this paper, the authors propose an optimized scheduling algorithm for cloud services....

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Integration of Java EE Applications on C - Based Implementations

    Sometimes the people may encounter a scenario in which they need to Integrate the existing Java - Based applications With the Native formats of C/C++ Based implementations For example the applications of Defense, Aerospace weather Forecasting Applications contain complex algorithms and that might be too complex And too difficult or...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Is the Cloud Educational Enterprise Resource Planning the Answer to Traditional Educational Enterprise Resource Planning Challenges in Universities?

    Universities, the new target for Enterprise Resource Planning (ERP) providers such as Google, SAP and Databiz to provide such systems in order to manage their activities in a manner that add value to information from operations and main processes. However challenges have showed to get in the way of applying...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Test Sequences for Web Service Composition Using CPN Model

    Web service composition is most mature and effective way to realize the rapidly changing requirements of business in service-oriented solutions. Testing the compositions of web services is complex, due to their distributed nature and asynchronous behaviour. Colored Petri Nets (CPNs) provide a framework for the design, specification, validation and verification...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    The Critical Need for Software Architecture Practices in Software Development Process

    Software architecture is the master plan of every reliable software system. It is the building block of any kind of software system which greatly determines the success of the system. This paper argues that every system needs a good architecture and that requires the use of good architecture engineering practices...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    A JADE Implemented Mobile Agent Based Host Platform Security

    Mobile agent paradigm relies heavily on security of both the agent as well as its host platform. Both of the entities are prone to security threats and attacks such as masquerading, denial-of-service and unauthorized access. Security fissures on the platform can result in significant losses. This paper produced a Robust...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    A Real-Time Filtering Method of Positioning Data With Moving Window Mechanism

    Now-a-days, advanced mobile devices can obtain current position with the help of positioning data systems such as GPS, GLONASS, Galileo, and so on. However, positioning data sets usually have erroneous data for various reasons, mainly due to the environmental issues as well as inherent systematical issues. While doing research related...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    A Study of Image Fingerprinting by Using Visual Cryptography

    As digital media has made the people life more colorful because of its advantages like easier to access, copy and distribute. But as what the authors have seen, series of malice activities like copyright infringement, counterfeiting, piracy and information distortion make damages to both the producers and the users of...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    An Efficient Scheduling Policy for Load Balancing Model for Computational Grid System

    Workload and resource management are two essential functions provided at the service level of the Grid system. To improvement in global throughput need, effective and efficient load balancing are fundamentally important. The authors also check that what type of scheduling policy is used by that algorithm, because an efficient scheduling...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    An Improvement to Trust Based Cross-Layer Security Protocol Against Sybil Attacks (DAS)

    The performance of distributed networks depends on collaboration among distributed entities. To enhance security in distributed networks, such as ad hoc networks, it is important to evaluate the trustworthiness of participating entities since trust is the major driving force for collaboration. The trust based security protocol based on a cross-layer...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Application of Computer Graphics Technique to Computer System Assembling

    Computer graphics is the representation and manipulation of image data by a computer using various technology to create and manipulate images. The development of computer graphics has made computer easier to interact with, and better for understanding and interpreting different types of data. Three-Dimensional (3D) computer graphics represent geometric data...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jul 2012

    Study of the Topology Mismatch Problem in Peer-to-Peer Networks

    The advantages of Peer-To-Peer (P2P) technology are innumerable when compared to other systems like Distributed Messaging System, Client-Server model, Cloud based systems. The vital advantages are not limited to high scalability and low cost. On the other hand the p2p system suffers from a bottle-neck problem caused by topology mismatch....

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Mobile Ad hoc Networks - Dangling Issues of Optimal Path Strategy

    Ad-hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration, in which individual nodes cooperate by forwarding packets to each other to allow nodes to communicate beyond direct wireless transmission range. Routing is a process of exchanging information from one...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Data Security Using Stegnography and Quantum Cryptography

    Stegnography is the technique of hiding confidential information within any media. In recent years, various stegnography methods have been proposed to make data more secure. At the same time different steganalysis methods have also evolved. The number of attacks used by the steganalyst has only multiplied over the years. Various...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    A New Scheme for Secured on Demand Routing

    A Mobile Ad-hoc NETwork (MANET) is characterized by mobile nodes, multi-hop wireless connectivity, non infrastructural environment and dynamic topology. A recent trend in ad-hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable routing, security and power efficiency are the major concerns in this...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    A Review of Improvement in TCP Congestion Control Using Route Failure Detection in MANET

    A Mobile Ad-hoc NETwork is an autonomous collection of mobile devices that communicate with each other over wireless links and cooperate in a distributed manner in order to provide the necessary network functionality in the absence of a fixed infrastructure. This type of network, operating as a stand-alone network or...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Providing Security to Wireless Packet Networks by using Optimized Security Method

    Now-a-days technology is growing very fast, due to rapid development of the technology in computer arena, communication through network become a habit to the users. Communication through network is happen using two channels i.e., by connection oriented and connection less. At present, users prefer wireless networks for communication and transferring...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Application-Independent Based Multicast Routing Protocols in Mobile Ad hoc Network (MANET)

    Multicasting is an efficient communication service for supporting multipoint applications. The main goal of most ad-hoc multicast protocols is to build and maintain a multicast tree or mesh in the face of a mobile environment, with fast reactions to network changes so that the packet loss is minimized. The topology...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Sans Signature Buffer Overflow Blocker

    The objective of Sans Signature buffer overflow blocker mainly is to intercept communications between a server and client, analyze the contents for the presence of executable code and prevent the code reaching the server. In this paper, Sans Signature is a signature free approach, which can identify and block new...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2011

    Signaling For Multimedia Conferencing in Stand-Alone Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are infrastructure-less and can be set up anywhere, anytime. They can host a wide range of applications in rescue operations, military, private, and commercial settings. Multimedia conferencing is the basis of a wealth of "Killer" applications that can be deployed in MANETs. Some examples are audio/video...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2011

    Soft Handover Scheme for WSN Nodes Using Media Independent Handover Functions

    The present wireless networks are equipped with multiple radio links and operate in a collaborative way to enable continuous data transfer even when any link goes down. The IEEE 802.21 is a standard to provide continuous wireless connectivity between heterogeneous link technologies using media independent handover functions as MIHF. The...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2011

    Design and Implementation of Distributed Space-Frequency to Achieve Cooperative Diversity in Wireless Relay Networks

    Recently, there has been much interest in modulation techniques that can help in achieving transmit diversity motivated by the increased capacity of Multiple-Input Multiple-Output (MIMO) channel. To achieve transmit diversity the transmitter needs to be equipped with multiple antennas. The antennas should be well separated to have uncorrelated fading among...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2011

    Trust Management in Ad-hoc Networks: A Social Network Based Approach

    A social network is a social structure made up of individuals called "Nodes", which are connected by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, or relationships of beliefs, knowledge or prestige. Social network analysis views social relationships in terms of network...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Detecting Cyber Attacks at Data Dribble

    In the modern era of technology, Internet information resources are actively growing, intruding many spheres of social life. Modern information technologies not only being introduced into private enterprises but also in the provision of public services. This paper proposes a new technique for detecting unauthorized network intrusions, based on a...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Measuring Round Trip Time and File Download Time of FTP Servers

    Today, Internet is a public, cooperative, and self-sustaining facility accessible to hundreds of millions of people worldwide. It has made the world a global village. It uses a layered model such as TCP/IP. Data can transfer easily using ordinary file transfer method such as HTTP and emails protocols. When to...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    A Deadlock - Free Routing Algorithm for Torus Network

    TORUS is an n-dimensional network topology. Each dimension will have k nodes. A routing algorithm determines the sequence of channels for a packet to traverse from the source to destination. A new router design that significantly reduces the main drawback of wormhole switching-latency, is presented in this paper. Worm-hole switching...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Comparison of Different Neural Networks for Iris Recognition: A Review

    Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. Among all the biometric modalities, iris has emerged as a popular choice due...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System

    The rapid development of computer networks and mostly of the Internet has created many stability and security problems such as intrusions on computer and network systems. Further the dependency of companies and government agencies is increasing on their computer networks and the significance of protecting these systems from attacks is...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Sub-Terahertz Low Power UWB Communication Link for WPAN

    In this, paper, the authors proposed a Ultra-WideBand (UWB) wireless communication system for transmitting digital information in the terahertz frequency range on the basis of analog noise carrier with a low level of radiation. The digital information at the transmitter is inserted using code spectrum modulation of noise signal. The...

    Provided By International Institute for Science, Technology and Education

  • White Papers // Jan 2012

    Look at IPV6 Security Advantages Over IPV4

    Due to the increase of Internet usage especially in homes, offices and there will be many devices that will use the new 3G/4G technologies, so Internet address exhaustion will be raised to serious problem gradually. Now-a-days, the IPv4 address shortage problem has been solved incompletely using NAT (Network Address Translation)...

    Provided By International Institute for Science, Technology and Education