International Journal of Communications and Engineering

Displaying 1-40 of 349 results

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Node Replica Detection in Wireless Sensor Networks

    Wireless sensor nodes lack hardware support for tamper resistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an adversary. In a node replication attack, an adversary can easily capture even a single node and inserts duplicated nodes at any location in the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Defensive Technique for Prefix Hijacking Attack Based on Route Reliability for BGP

    In internet, prefix hijacking is the type of network attack that can give malicious parties access to untraceable IP addresses. To defend against Prefix Hijacking Attack which is a category of path validation in Border Gateway Protocol (BGP), the authors propose to design a defensive technique which consists of route...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reducing Network Block Rate Using Wavelength Heuristics in Optical WDM Networks

    In survivable optical WDM networks, wavelength assignment is a major concern than assigning routes to the light paths. Earlier wavelength assignment algorithm suffers from unbalanced utilization of wavelength that leads to blocking probability for any connection request. In this paper, the authors analyze various wavelength heuristics and how to minimize...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of AES Using Intra-Round Pipelining Technique

    Advanced Encryption Standard has received significant interest over the past decade due to its performance and security level. Many hardware implementations have been proposed. In most of the previous papers, sub-bytes and inverse sub-bytes are implemented using lookup table method. In this paper, the authors used combinational logic which helps...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Digital Filter for Multistandard Wireless Transceivers

    A digital decimation filter is designed for delta - sigma analog to digital converter. The designed filter has a multi-stage structure which is comprised of a stage CIC filter, two stage half - band filters and a stage compensation filter. Now-a-days in wireless and audio application the use of efficient...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Applying Data Mining Techniques in Genetic Fuzzy Systems Rules To Network Intrusion Detection

    In this paper, the authors present how Data Mining discovers and extracts useful patterns from this large data to find observable patterns. The paper demonstrates the ability of Data Mining in improving the quality of decision making process in pharm industry. However, as they progress into a more integrated world...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Vehicle Theft Prevention and Location Finding System Using Face Detection Based on Image Processing

    The evident fact in the world is that the number of vehicles particularly cars and other automobiles escalating in terms of invention as well as theft attempts. Even though a lot of global and other manufacturing industry did lot of efforts to invent vehicle security system particularly for cars, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Bandwidth Efficient and Privacy-Aware Mobile Applications in Android

    Collaborative applications running on 3G devices often rely on cloud-based servers for computation and storage. A peer-to-peer approach to building these applications can provide benefits such as enhanced privacy and bandwidth efficiency. The authors propose a system which is based on asynchronous network architecture that uses the cloud to relay...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Co-Operative Spectrum Sensing Using Wavelet Transform

    In cognitive radio networks, spectrum sensing is a crucial component in the discovery of spectrum opportunities for secondary systems (or unlicensed systems). Cognitive radio is used to allow the unlicensed user to use the band of primary user. Cognitive radio is used to solve spectrum scarcity and spectrum underutilization problem....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    System Security Using Keystroke Analysis

    Security is the most important concern now-a-days. Now the authors' education system improves, by the way intruders also increase. To protect users system from them, they need to improve security. When users leave the system alive without log off, at the time some intruders enter their system and may misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Distributed Throughput Using RFID in Wireless Networks

    In a distributed system of ATM, the data and the information are not secured and can be easily accessed by some other user. So in order to avoid those drawback of existing system, the authors are using the RFID card and reader to access the user's account. One user can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Robust Traffic Management Scheme For Wireless Ad-Hoc Network

    Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath routing protocols, which should provide the fault tolerance for broken links and the load balance for extending bandwidth and equalizing energy consumption. A cross layer approach is introduced for routing and MAC scheduling called RTMS (Robust Traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis Of Credit Card Fraud Detection Using Hidden Markov Model

    Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization Algorithms For Wireless Adhoc Networks

    It monitors personal locations with a potentially untrusted server poses privacy threats. The two algorithms, namely, resource-aware and quality-aware algorithms that aim to provide high quality location monitoring services for system users. Both algorithms established k-anonymity privacy concept to enable trusted sensor nodes to provide the aggregate location information. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Effective Load Balancing with Multipath Load Distribution Over End To End System

    Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. An effective model of delay-controlled load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Node Replica Detection in Wireless Sensor Networks

    Wireless sensor nodes lack hardware support for tamper resistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an adversary. In a node replication attack, an adversary can easily capture even a single node and inserts duplicated nodes at any location in the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Defensive Technique for Prefix Hijacking Attack Based on Route Reliability for BGP

    In internet, prefix hijacking is the type of network attack that can give malicious parties access to untraceable IP addresses. To defend against Prefix Hijacking Attack which is a category of path validation in Border Gateway Protocol (BGP), the authors propose to design a defensive technique which consists of route...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reducing Network Block Rate Using Wavelength Heuristics in Optical WDM Networks

    In survivable optical WDM networks, wavelength assignment is a major concern than assigning routes to the light paths. Earlier wavelength assignment algorithm suffers from unbalanced utilization of wavelength that leads to blocking probability for any connection request. In this paper, the authors analyze various wavelength heuristics and how to minimize...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of AES Using Intra-Round Pipelining Technique

    Advanced Encryption Standard has received significant interest over the past decade due to its performance and security level. Many hardware implementations have been proposed. In most of the previous papers, sub-bytes and inverse sub-bytes are implemented using lookup table method. In this paper, the authors used combinational logic which helps...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Digital Filter for Multistandard Wireless Transceivers

    A digital decimation filter is designed for delta - sigma analog to digital converter. The designed filter has a multi-stage structure which is comprised of a stage CIC filter, two stage half - band filters and a stage compensation filter. Now-a-days in wireless and audio application the use of efficient...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Applying Data Mining Techniques in Genetic Fuzzy Systems Rules To Network Intrusion Detection

    In this paper, the authors present how Data Mining discovers and extracts useful patterns from this large data to find observable patterns. The paper demonstrates the ability of Data Mining in improving the quality of decision making process in pharm industry. However, as they progress into a more integrated world...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Vehicle Theft Prevention and Location Finding System Using Face Detection Based on Image Processing

    The evident fact in the world is that the number of vehicles particularly cars and other automobiles escalating in terms of invention as well as theft attempts. Even though a lot of global and other manufacturing industry did lot of efforts to invent vehicle security system particularly for cars, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Bandwidth Efficient and Privacy-Aware Mobile Applications in Android

    Collaborative applications running on 3G devices often rely on cloud-based servers for computation and storage. A peer-to-peer approach to building these applications can provide benefits such as enhanced privacy and bandwidth efficiency. The authors propose a system which is based on asynchronous network architecture that uses the cloud to relay...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Co-Operative Spectrum Sensing Using Wavelet Transform

    In cognitive radio networks, spectrum sensing is a crucial component in the discovery of spectrum opportunities for secondary systems (or unlicensed systems). Cognitive radio is used to allow the unlicensed user to use the band of primary user. Cognitive radio is used to solve spectrum scarcity and spectrum underutilization problem....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    System Security Using Keystroke Analysis

    Security is the most important concern now-a-days. Now the authors' education system improves, by the way intruders also increase. To protect users system from them, they need to improve security. When users leave the system alive without log off, at the time some intruders enter their system and may misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Distributed Throughput Using RFID in Wireless Networks

    In a distributed system of ATM, the data and the information are not secured and can be easily accessed by some other user. So in order to avoid those drawback of existing system, the authors are using the RFID card and reader to access the user's account. One user can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Robust Traffic Management Scheme For Wireless Ad-Hoc Network

    Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath routing protocols, which should provide the fault tolerance for broken links and the load balance for extending bandwidth and equalizing energy consumption. A cross layer approach is introduced for routing and MAC scheduling called RTMS (Robust Traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis Of Credit Card Fraud Detection Using Hidden Markov Model

    Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization Algorithms For Wireless Adhoc Networks

    It monitors personal locations with a potentially untrusted server poses privacy threats. The two algorithms, namely, resource-aware and quality-aware algorithms that aim to provide high quality location monitoring services for system users. Both algorithms established k-anonymity privacy concept to enable trusted sensor nodes to provide the aggregate location information. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Effective Load Balancing with Multipath Load Distribution Over End To End System

    Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. An effective model of delay-controlled load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ticket Based Security Architecture For Anonymizing and Tracing Misbehaving Clients in Wireless Mesh Networks

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy now-a-days. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and Peer-To-Peer (P2P) systems, little effort has been...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation Of Multipath Routing And Max-Min Fair Qos Provisioning In Distributed Systems

    Main aim of the author's paper is to send and receive packets without any problems such as hacking, congestion, traffic, overloading etc., There are many techniques were introduced to avoid these above problems; in this paper, in existing system he introduced mix networks to avoid congestion problem. The major disadvantage...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Document Clustering with Semantic Analysis Using Parallel Spectral Method

    Text documents are one of the unstructured data models that represents the information. Clustering techniques are used to group the documents based on the similarity. Parallel spectral clustering algorithm is used to cluster large data collections. Dense similarity matrix approximation is applied to reduce memory usage. Parallel spectral clustering algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing In Delay Tolerant Networks Using Minimum Distance Packet Forwarding

    Delay tolerant networks have intermittent connectivity between their nodes. There is no stable end-to-end connectivity from source to destination because the future node connections are mostly unknown. In these networks, opportunistic forwarding technique is used to deliver the message. By observing human mobility traces the conditional intermeeting time is used...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A QoS-Aware Team Multicast Routing Protocol For Mobile Ad Hoc Networks

    Team multicast identifies clusters of nodes with same affinity as teams and manages the multicast membership information using the unit of team rather than dealing with individual node members. The source propagates a data packet to each subscribed team's leader and each leader forwards the data to the entire team....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining User's Interests From Weblog Data

    Analyzing users' internet log information and extracting their interests of Web-watching behaviors are vital and challenging analysis topics of internet usage mining. Users visit their favorite sites and generally search new sites by performing keyword search on search engines. Users' Web-watching behaviors is considered a graph since visited websites and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Attack Mitigation Using Single Test Proportion

    The internet is the backbone of day to day applications. Today's responsibility for the internet service providers is to make sure that the internet service is available to the end user at all times. DDoS is a computer war against authenticated user, which makes the web server incompetent of providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Reduction Using Adaptive Clustering In Sensor Networks

    In many applications of Wireless Sensor Networks (WSNs), it is necessary to continuously extract data from the networks. It is expensive to obtain all sensor readings. Clustering and prediction techniques, which exploit spatial and temporal correlation among the sensor data, provide opportunities for reducing the energy consumption of continuous sensor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    K-Means Clustering with Careful Seeding For Large Cluster Number

    Clustering is the unsupervised classification of patterns into groups so that the objects in the same cluster are more similar. There are many clustering algorithms based on cluster model such as connectivity based hierarchical algorithm, centroid based k-means algorithm, distribution based expectation-maximization algorithm and density based algorithm. Among these, K-means...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Bit Stream Compression Using Golomb Coding In FPGA

    Field-Programmable Gate Array (FPGA) is widely used in reconfigurable systems. Since the configuration information for FPGA has to be stored in internal or external memory as bit streams, the limited memory size and access bandwidth become the key factors in determining the different functionalities that a system can be configured...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting Fault Localization By Giving Different Test Cases For The Code

    Localizing the fault is complex while executing the program. The authors proposed a technique code coverage, statement coverage based fault localization. In this, programmers identify and repair faulty code more effectively and efficiently. In this paper, they also report on experiments performed on the "Siemen Test Suite". By the code...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Range and Location Based Privacy Aware Monitoring For Dynamic Objects

    Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a Privacy-Aware Monitoring (PAM) framework that addresses both issues. The framework distinguishes itself from the existing work by being the first to holistically address the issues of location updating in terms of monitoring accuracy, efficiency and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ranking and Optimising Web Services in Semantic Dimension Using PSO Algorithm

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To address QoS-aware semantic web...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Wi-Fi Tehnology and its Trends in IT

    There are many trends in users IT industry. Here the authors are going to discuss about the emerging technology in IT (i.e.) Wi-Fi technology. Wi-Fi (Wireless Fidelity) is a way to connect to the internet without any wires or cumbersome cables. Wi-Fi technology uses a radio technology called 802.11b for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Framework For Accountability and Trust in Cloud Computing

    Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. In this paper, the authors ensure the trust in cloud computing by enabling Public...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Feature Reduction Technique For Large Scale Text Data

    The text data dimension reduction plays an important role in the present day mining of text data and information retrieval. Dimensionality reduction algorithms are generally designed for feature extraction or feature selection. The authors' paper feature-selection algorithm can achieve the optimal solution according to its objective function. In this paper,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Business Model For Cloud Computing with Caching Notion

    In this paper, the authors propose a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext and the party responsible for data encryption and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Security and Performance Outsourcing Over Cloud Computing Using Linear Programming

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adhoc Network Security Using Dynamic IP Configuration

    In MANETs, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In the authors' paper, they present an ID based dynamic IP configuration scheme that can securely allocate IP addresses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Third Party Auditing For Dynamic Data

    In cloud storage system, the client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. Existing protocols support both features with the help...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preservation Against Traffic Analysis Using Random Network Coding in Multi-Hop Wireless Networks

    In multi-hop wireless networks, privacy threat is one of the critical issues, where attacks such as traffic analysis can be easily launched by a malicious adversary due to the open-air transmission. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ontology Based Semantic Annotation Framework

    In this paper, the authors present a semantic annotation framework that is capable of extracting appropriate information from unstructured, ungrammatical and unintelligible data sources. The framework, named BNOSA, uses ontology to conceptualize a problem domain and to extract data from the given corpora and Bayesian networks to resolve conflicts and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy Based IP Traceback Against DDOS Attacks

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory-less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Connectivity at Failures By ISPs with Minimum Cost

    Often users face risk of failures on many links or routers in Internet for various reasons, such as fiber cuts, failure of transmission devices, misconfiguration of routers and overloading of routers. Internet is required to be robust enough to sustain connectivity between nodes and maintain stable services in the event...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering