International Journal of Communications and Engineering

Displaying 1-40 of 349 results

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimisation of Path Using Genetic Algorithm for Wireless Sensor Networks

    In the wireless sensor networks, one of the most important and challenging problem in designing process is to develop an efficient routing protocol for providing the high traffic load which causes a data queue overflow in the sensor nodes. Since this queue overflow may causes data transmission failures, so to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Computing Process Execution in Multicloud Environment

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimisation of Path Using Genetic Algorithm for Wireless Sensor Networks

    In the wireless sensor networks, one of the most important and challenging problem in designing process is to develop an efficient routing protocol for providing the high traffic load which causes a data queue overflow in the sensor nodes. Since this queue overflow may causes data transmission failures, so to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Computing Process Execution in Multicloud Environment

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing in Mobile Ad-hoc Cognitive Radio Networks

    Recent research activities about Cognitive Radio (CR) are mainly focusing on opportunistic spectrum access and spectrum utilization. However, CR technology will have significant impacts on upper layer performance in wireless networks, especially in Mobile Ad-hoc NETworks (MANETs). In this paper, the authors study topology control and routing issues in CR-MANETs...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving QoS for MANET By Using Energy Conserved Cluster Scheme

    Now-a-days, wireless networks are becoming more popular and it can be used in all real world applications. So it is necessary to provide a good Quality of Service (QOS) for delivering a voice, video and data. To provide different types of priority to different types of applications, QoS will provide...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Passenger Assisting System

    Advanced cell phones systems are developing to support the people to live in semi-independent and independent environments also it perform essential Activities for Daily Livings (ADLs). The approach taken is regarding context-aware and sensor enriched environments for home and medical care settings. It generally focused on the following goals, providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximizing The Performance of Wireless Ad Hoc Networks Using ALOHA and CSMA Protocols

    The performances of the MA protocols are analyzed in wireless ad-hoc networks. The main objective is correct reception of packets at its intended receiver in wireless adhoc network and the analysis is made in terms of throughput, delay and outage probability. In particular, two MAC protocols, ALOHA and Carrier Sense...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Hybrid Job Scheduling Strategy for Computational Grid Environment

    Grid computing is an extensive technology which has the potential to solve large scale scientific problems in an integrated heterogeneous environment. For such an infrastructure, efficient scheduling of jobs and management of resources serve as the key aspects to improve the efficiency and to exploit the capabilities of the emergent...

    Provided By International Journal of Communications and Engineering