International Journal of Communications and Engineering

Displaying 1-40 of 349 results

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Profile Based Ticket Generation for Achieving Anonymity and Traceability in Wireless Mesh Networks

    A wireless mesh network is very similar to a regular wireless network. But, a wireless mesh network covers a much larger area, than the other. The nodes in the WMNs can configure automatically and re-configure dynamically to maintain the mesh connectivity. One of the fundamental challenges in WMNs is how...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secured Enhancement for Reauthentication Over Wireless Sensor Network

    Now-a-days Wireless Sensor Network (WSN) is an emerging technology in ubiquitous computing environment. When performing monitoring tasks in hostile environments, security requirements become critically important and also the most challenging issue in WSN. Due to the mobility of the nodes, high security and authentication should be needed. So considering the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymizing Unstructured Peer to Peer Systems by Random Walks Using Lightflood Approach

    Anonym zing peer to peer systems cause extra traffic cost. For privacy considerations many system try to mask their identities. Existing approach for anonym zing peer-to-peer systems are path based, hence peers have to pre-construct the path for transmission hence maintaining and updating such path is high. The authors propose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Electing Monitoring Node Through Fuzzy Theory in Wireless Mesh Network for Defense Against Selective Forwarding Attack

    In this paper, the authors are going to deal with an attack known as selective forwarding attack in Wireless Mesh Network (WMN). Selective forwarding attack is one in which the node forwards a subset of packets and drops the others. Most of the existing studies on selective forwarding attack focuses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    GPS and GSM Based Vehicle Information System

    Public transportations such as taxi, buses and trains between cities are carrying millions of passengers every day. Traditional methods of operating and monitoring systems for such vehicles is a difficult task and inefficient. This usually leads to missed or late arrivals to scheduled stops, improper use of company time and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Speed and Area Optimized Floating Point FPGA Architecture

    In this paper, an architecture for a reconfigurable device is proposed that is specifically designed for floating-point applications. Fine-grained units are used for implementing control logic and bit-oriented operations. Reconfigurable word-based coarse-grained units are word-oriented lookup tables. Floating-point operations are used to implement data-paths. This methodology involves adopting existing FPGA...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Security Through Agent Based Non-Repudiation Protocol for Mobile Digital Right Management (DRM)

    In mobile communication, the key factor that affects the performance of a good security protocol is the timeliness of the security components of the transactions. Even though, there are mathematically well-established rigid security algorithms and implementation mechanisms available in the market, it is very difficult to predict the events in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Computation Efficient Multicast Key Distribution

    In the secure group communication a group key is shared by all the users. The group key is used to encrypt data transmitted to the group. The group membership is dynamic. When group membership changes, to protect the confidentiality of the current users, a new group key needs to be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Emergency Message Dissemination in Two Dimensional Space Using Percolation Phenomenon

    Vehicular Ad-hoc NETworks (VANETs) are an important part of Intelligent Transport System (ITS) which is used to avoid traffic congestion, improve traffic efficiency and to prevent accidents for enhancing road safety. In this paper, a modified Time and Location Critical (M-TLC) framework for dissemination of emergency messages is proposed. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Persistent Communication Using Ednr Protocol in Manet

    The main motivation of this paper is to provide Quality of Service (QoS) guarantees in mobile ad hoc networks. In mobile ad hoc networks, a host may lose its energy or roam independently without informing to its cooperative nodes, causing changes in network topology, and thus, these changes cause overwhelming...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Acknowledgement Based Scheme to Defend Against Cooperative Black Hole Attacks in DSR Routing Protocol

    Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. The authors propose a routing-aware multiple description video coding approach to support video transmission over mobile ad-hoc networks with multiple path transport. They build a statistical model to estimate the packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Preventive Mechanism for Blocking Attact of Maobile Agents in Secured Layer Architecture

    In distributed computing, mobile agent plays a major role as it is utilizing the resources available on the connected network and its capability of operation on different environments. When an agent migrates from one node to another node to fulfill the task of its owner, the agent route is decided...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Extended Security for Intrusion Detection System Using Data Cleaning in Large Database

    A suitable response to an atypical request is issued by the intrusion detection system. The concept of database response policies to support the intrusion response system adapted for a database management system is proposed. Depending on the nature of the anomalous request, the database administrators provide the response actions for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Digital Video Broadcasting-T2: Multiple Input Multiple Output Configuration

    This paper explores the possibility of implementing multiple antennas at the transmission side with multiple receiving antennas which is technically called as Multiple Input Multiple Output (MIMO) configuration. Digital Video Broadcasting Terrestrial Second generation (DVB-T2) is chosen as a potential digital signal broadcasting technology for the above. Orthogonal Frequency Division...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Performance Using Efficient Clustering in Wireless Networks

    The main difficulty of routing based on a predefined set of customer preferences is critical factor for guaranteeing quality-of-service in complex distributed system. The main aim of this paper is to improve performance of QOS by providing fault tolerance with efficient utilization of energy. Performance is analyzed for both FDCB...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Profile Based Ticket Generation for Achieving Anonymity and Traceability in Wireless Mesh Networks

    A wireless mesh network is very similar to a regular wireless network. But, a wireless mesh network covers a much larger area, than the other. The nodes in the WMNs can configure automatically and re-configure dynamically to maintain the mesh connectivity. One of the fundamental challenges in WMNs is how...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secured Enhancement for Reauthentication Over Wireless Sensor Network

    Now-a-days Wireless Sensor Network (WSN) is an emerging technology in ubiquitous computing environment. When performing monitoring tasks in hostile environments, security requirements become critically important and also the most challenging issue in WSN. Due to the mobility of the nodes, high security and authentication should be needed. So considering the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymizing Unstructured Peer to Peer Systems by Random Walks Using Lightflood Approach

    Anonym zing peer to peer systems cause extra traffic cost. For privacy considerations many system try to mask their identities. Existing approach for anonym zing peer-to-peer systems are path based, hence peers have to pre-construct the path for transmission hence maintaining and updating such path is high. The authors propose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Electing Monitoring Node Through Fuzzy Theory in Wireless Mesh Network for Defense Against Selective Forwarding Attack

    In this paper, the authors are going to deal with an attack known as selective forwarding attack in Wireless Mesh Network (WMN). Selective forwarding attack is one in which the node forwards a subset of packets and drops the others. Most of the existing studies on selective forwarding attack focuses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    GPS and GSM Based Vehicle Information System

    Public transportations such as taxi, buses and trains between cities are carrying millions of passengers every day. Traditional methods of operating and monitoring systems for such vehicles is a difficult task and inefficient. This usually leads to missed or late arrivals to scheduled stops, improper use of company time and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Speed and Area Optimized Floating Point FPGA Architecture

    In this paper, an architecture for a reconfigurable device is proposed that is specifically designed for floating-point applications. Fine-grained units are used for implementing control logic and bit-oriented operations. Reconfigurable word-based coarse-grained units are word-oriented lookup tables. Floating-point operations are used to implement data-paths. This methodology involves adopting existing FPGA...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Security Through Agent Based Non-Repudiation Protocol for Mobile Digital Right Management (DRM)

    In mobile communication, the key factor that affects the performance of a good security protocol is the timeliness of the security components of the transactions. Even though, there are mathematically well-established rigid security algorithms and implementation mechanisms available in the market, it is very difficult to predict the events in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Computation Efficient Multicast Key Distribution

    In the secure group communication a group key is shared by all the users. The group key is used to encrypt data transmitted to the group. The group membership is dynamic. When group membership changes, to protect the confidentiality of the current users, a new group key needs to be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Emergency Message Dissemination in Two Dimensional Space Using Percolation Phenomenon

    Vehicular Ad-hoc NETworks (VANETs) are an important part of Intelligent Transport System (ITS) which is used to avoid traffic congestion, improve traffic efficiency and to prevent accidents for enhancing road safety. In this paper, a modified Time and Location Critical (M-TLC) framework for dissemination of emergency messages is proposed. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Persistent Communication Using Ednr Protocol in Manet

    The main motivation of this paper is to provide Quality of Service (QoS) guarantees in mobile ad hoc networks. In mobile ad hoc networks, a host may lose its energy or roam independently without informing to its cooperative nodes, causing changes in network topology, and thus, these changes cause overwhelming...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Acknowledgement Based Scheme to Defend Against Cooperative Black Hole Attacks in DSR Routing Protocol

    Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. The authors propose a routing-aware multiple description video coding approach to support video transmission over mobile ad-hoc networks with multiple path transport. They build a statistical model to estimate the packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Preventive Mechanism for Blocking Attact of Maobile Agents in Secured Layer Architecture

    In distributed computing, mobile agent plays a major role as it is utilizing the resources available on the connected network and its capability of operation on different environments. When an agent migrates from one node to another node to fulfill the task of its owner, the agent route is decided...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Extended Security for Intrusion Detection System Using Data Cleaning in Large Database

    A suitable response to an atypical request is issued by the intrusion detection system. The concept of database response policies to support the intrusion response system adapted for a database management system is proposed. Depending on the nature of the anomalous request, the database administrators provide the response actions for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Digital Video Broadcasting-T2: Multiple Input Multiple Output Configuration

    This paper explores the possibility of implementing multiple antennas at the transmission side with multiple receiving antennas which is technically called as Multiple Input Multiple Output (MIMO) configuration. Digital Video Broadcasting Terrestrial Second generation (DVB-T2) is chosen as a potential digital signal broadcasting technology for the above. Orthogonal Frequency Division...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Performance Using Efficient Clustering in Wireless Networks

    The main difficulty of routing based on a predefined set of customer preferences is critical factor for guaranteeing quality-of-service in complex distributed system. The main aim of this paper is to improve performance of QOS by providing fault tolerance with efficient utilization of energy. Performance is analyzed for both FDCB...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Modified Autonomous Network Reconfiguration System for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. During their lifetime, multihop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications' bandwidth demands. Modified Autonomous network Reconfiguration System...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Low Power Fir Filter Using Improved Carry Select Adder

    Design of area- and power efficient high-speed data path logic system forms the largest areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to transmit a carry through the adder. Carry SeLect Adder (CSLA) is one of the fastest...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting the Data Leakage Using Fake Objects

    A data distributor has given sensitive data to a set of supposedly trusted agents. Some of the data are leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from one or more agents as opposed to having been independently gathered by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving of Digital Data Using Complex Non Linear Adaptive Filtering

    In the Field of Signal Processing in Encrypted Domain (SPED) has emerged in order to provide efficient and secure solutions for preserving privacy of signals that are processed by untrusted agents. In this work, privacy problem of adaptive filtering is one of most important and ubiquitous blocks in signal processing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Different Privacy Preserving Methods in Cloud Environment

    Peoples enjoy the full benefits of Cloud computing if they can address the very real privacy and security concerns that come along with storing sensitive personal information in databases and software scattered around the Internet. It provides convenient on-demand network access to a shared pool of configurable computing resources that...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving True Query-Cluster Distance Bound by Optimizing Clustering Algorithm

    Clustering approach is represented for the analysis of similarity between the information within the database of any dimension. In order to have an effective a similarity search on a high dimensional database where exists correlated data, have to improve or extend the conventional clustering methods with different approaches. There have...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Designing a Secure and Effective Throughput Model for Intrusion Detection in Manet

    Recent year a rapid development and wide-spread application of mobile ad-hoc networks suffer from security attacks and privacy issues which dramatically impede their applications. Clustering methods allow fast connection, better routing and topology management of Mobile Ad-hoc Networks, but the traffic in between the cluster heads decreases the throughput. This...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    On Performance Analysis of LTE System Based Preceding Matrix Indicator

    This paper presents an efficient method for calculating the Precoding Matrix Indicator (PMI) at the receiver. The PMI is required for MIMO precoding in the downlink of a 3GPP LTE system. The authors' method is based on maximizing the mutual information between the transmitted and received symbols with respect to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for QoS Aware Semantic Web Services

    Resource allocation and job scheduling are the core functions of grid computing. These functions are based on adequate information of available resources. Timely acquiring resource status information is of great importance in ensuring overall performance of grid computing. This paper aims at building a distributed system for grid resource monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Data Delegation and Data Storage Security in Cloud Computing

    Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data-center resources, uphold user privacy, and preserve data integrity. The work suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Way of IP Traceback of DDOS Attacks Based on Entropy Variation

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. It is extremely hard to traceback the attackers because of memoryless feature of the internet routing mechanisms. As a result, there is no effective and efficient method to deal with this issue .In this paper, traceback of the attackers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Proposed CISGA and DGSA Algorithm for Infrastructure - BASED Cognitive Radio Network

    This paper propose a joint scheduling and infrastructure based cognitive radio network in coexistence with a cellular primary radio network. The problem is formulated to maximise the spectrum utilization of secondary user without causing an excessive interference to active primary user of the PRN. The authors going to minimises the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Error Correction Scheme Based on Keyboard Scan Decoding for NOCS With Type Ii HARQ

    The increasing probability of multi-bit interconnect errors in nanoscale technology will require the use of more powerful error control coding methods. For this, product code concept using extended hamming code can correct multiple errors using low complexity hardware. Decoding of the proposed work is based on keyboard scan method instead...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis and Design of Fault Tolerance Mechanism With Fast Restart

    As systems became more complex the failure rate keeps increasing. Checkpointing represents a very effective solution to assure the continuity of distributed and parallel applications in the occurrence of failures. Checkpoint/Restart is a fault tolerance technique and mainly focuses on optimizing checkpoint operation not on restart operation. As a result,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Dimensional Data Clustering With Dynamic Error Threshold Estimation Model

    Genes are considered as high dimensional data. Clustering high dimensional data is very challenging especially when the data is skewed. The existing system consists of popular algorithms like k-means and CAST. Implementing these algorithms for a large genome-scale gene expression data set is practically impossible. A novel method for clustering...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Route Maintenance for Sensor Networks

    Data information's are sent from one system to another without any security bleaching or malicious attacks. Currently Topology Maintenance Protocol is used for information transformation. Topology Maintenance Protocol increase the life time of the sensor network by only maintaining a subset of nodes in an active or awake state. TMPs...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Optimized Profile Based Online Data Delivery

    The diversity of data sources and Web services currently available on the Internet. In this paper, the authors develop a framework for comparing pull based solutions and present dual optimization approaches. The first approach maximizes user utility while satisfying constraints on the usage of system resources. The second approach satisfies...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Realtime Intrusion Detection for Wireless Networks Based on Aodv Routing Protocol

    Security of wireless ad hoc network over insecure communication channel is a challenging task. In this paper, some of the threats to wireless ad hoc networks and specifically, some attacks against the AODV routing protocol re discussed. AODV tool is aimed at real-time detection of these attacks. This tool monitors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Path Based Energy Efficient Fast Reconfiguration Mechanism in Wireless Mesh Network

    Frequent link failures are experienced in multi-hop wireless networks, due to channel interference, dynamic obstacles and bandwidth demands. These failures cause severe performance degradation in wireless mesh network, which needs manual network management for recovery. An Autonomous network Reconfiguration System (ARS) algorithm is proposed in this paper, to overcome the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secrecy and Cooperative Firewall Policies in Virtual Private Network

    Virtual Private Network (VPN) is a globally used technology allows the user to create encrypted tunnel. CDCF (Cross-Domain Cooperative Firewall) is vulnerable to selective policy updating attacks, by which the policy owner can quickly reveal the request of the other party. Furthermore, CDCF is inefficient because it uses commutative encryption...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi-Populated Parallel Genetic Algorithm for Outlier Detection

    Outlier detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. Fundamental issue is that the notion of objects that are outliers typically varies between users, problems, domains or even datasets. Various researches have been carried out with different methods for outlier detection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Virtual Systems Workload Characterization

    Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single workload benchmark is useful in quantifying the virtualization overhead within a single VM, but not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Data Retrieval Clustering Based Anomaly Intrusion Detection System in Mining Process With Time Prediction

    A network intrusion is any type of attack or malicious activity that can compromise the stability or security of a network environment. Intruders can be classified in two groups. External intruders don't have authorized access to the system or network they attack, while internal intruders have some authority access to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Conflict-Free Transmission With Dynamic Scheduling for Sensor Network Queries

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Privacy and Authorization in Grid Using Advanced Encryption Standard

    The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and...

    Provided By International Journal of Communications and Engineering