International Journal of Communications and Engineering

Displaying 1-40 of 349 results

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Scheduling Algorithm for Minimizing The Queue Over-Flow Probability in Cellular Networks

    The use of optimization and economic ideas in network resource allocation has a long history, going back to the study of transportation networks. The proposal is to use as adaptation variables the components of rate for each path from source to destination. In this paper, a wireless scheduling algorithms for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multicast Content Delivery in Multimedia using Protocol Independent Multicast Sparse Mode (PIM-SM)

    Traffic Engineering is the emerging mechanism for the Internet Network Provider required optimizing network performance and traffic delivery. In the multicast communication the message is transferred from one sender to various active receivers instead of all receivers like broadcast communication. Traffic is a major problem in the multicast communication which...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Routing in Dynamic AODV Protocol for Predicting Route Lifetime

    A Mobile Ad-hoc NETwork is defined as a transient network which is formed dynamically by the collection of nodes which are arbitrary. It can also be called as infrastructure less network, because it has no structure frame for positioning the nodes, these nodes are combined and this union forms a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Minimizing Transmit Power Using Efficient and Reliable Routing Protocol in Wireless Sensor Networks for Avionics

    The main design issues for a sensor network are conservation of energy available at each sensor node. Nodes have limited energy and forward messages of different priorities are frequent in wireless sensor networks. In this paper, reliable selective forwarding is based on available battery, importance of messages, problems of interference...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Frequent Pattern Mining with Systolic Tree on Reconfigurable Platform

    In business, companies are working fast to gain a valuable competitive advantage over other businesses. A fast-growing and popular technology, which can help to gain this advantage, is data mining. Data mining technology allows a company to use the mass quantities of data that it has compiled and develop correlations...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Map-Reduce Function for Cloud Data Storage and Data Integrity Auditing by Trusted TPA

    Delivering IT-enabled services via the internet that are built for the end user to be in control is what has come to be called 'Cloud computing'. Computing resources such as processing power, storage, database and messaging are no longer confined within the four walls of an enterprise. Due to lack...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimisation of Path Using Genetic Algorithm for Wireless Sensor Networks

    In the wireless sensor networks, one of the most important and challenging problem in designing process is to develop an efficient routing protocol for providing the high traffic load which causes a data queue overflow in the sensor nodes. Since this queue overflow may causes data transmission failures, so to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Geographic Routing with Local Face Information without Planarization

    Geographic routing also called position-based routing is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. The paper designs new geographic routing algorithms, namely Greedy Distributed Spanning Tree Routing (GDSTR)...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mobility and Traffic Model Data Dissemination in Vehicular Networks

    Vehicular networks have great interest in the research community and multihop data dissemination has become an important issue. Vehicular adhoc network is a type of mobile adhoc network, in which mobile nodes forming temporary or short lived network without any fixed infrastructure. This paper proposed the concept of data dissemination...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Scheduling Algorithm for Minimizing The Queue Over-Flow Probability in Cellular Networks

    The use of optimization and economic ideas in network resource allocation has a long history, going back to the study of transportation networks. The proposal is to use as adaptation variables the components of rate for each path from source to destination. In this paper, a wireless scheduling algorithms for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multicast Content Delivery in Multimedia using Protocol Independent Multicast Sparse Mode (PIM-SM)

    Traffic Engineering is the emerging mechanism for the Internet Network Provider required optimizing network performance and traffic delivery. In the multicast communication the message is transferred from one sender to various active receivers instead of all receivers like broadcast communication. Traffic is a major problem in the multicast communication which...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Routing in Dynamic AODV Protocol for Predicting Route Lifetime

    A Mobile Ad-hoc NETwork is defined as a transient network which is formed dynamically by the collection of nodes which are arbitrary. It can also be called as infrastructure less network, because it has no structure frame for positioning the nodes, these nodes are combined and this union forms a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Minimizing Transmit Power Using Efficient and Reliable Routing Protocol in Wireless Sensor Networks for Avionics

    The main design issues for a sensor network are conservation of energy available at each sensor node. Nodes have limited energy and forward messages of different priorities are frequent in wireless sensor networks. In this paper, reliable selective forwarding is based on available battery, importance of messages, problems of interference...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Frequent Pattern Mining with Systolic Tree on Reconfigurable Platform

    In business, companies are working fast to gain a valuable competitive advantage over other businesses. A fast-growing and popular technology, which can help to gain this advantage, is data mining. Data mining technology allows a company to use the mass quantities of data that it has compiled and develop correlations...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Map-Reduce Function for Cloud Data Storage and Data Integrity Auditing by Trusted TPA

    Delivering IT-enabled services via the internet that are built for the end user to be in control is what has come to be called 'Cloud computing'. Computing resources such as processing power, storage, database and messaging are no longer confined within the four walls of an enterprise. Due to lack...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimisation of Path Using Genetic Algorithm for Wireless Sensor Networks

    In the wireless sensor networks, one of the most important and challenging problem in designing process is to develop an efficient routing protocol for providing the high traffic load which causes a data queue overflow in the sensor nodes. Since this queue overflow may causes data transmission failures, so to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Geographic Routing with Local Face Information without Planarization

    Geographic routing also called position-based routing is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. The paper designs new geographic routing algorithms, namely Greedy Distributed Spanning Tree Routing (GDSTR)...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mobility and Traffic Model Data Dissemination in Vehicular Networks

    Vehicular networks have great interest in the research community and multihop data dissemination has become an important issue. Vehicular adhoc network is a type of mobile adhoc network, in which mobile nodes forming temporary or short lived network without any fixed infrastructure. This paper proposed the concept of data dissemination...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Integrated Resource Allocation and Trust Model for Heterogeneous Distributed Systems

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Resources are allocated for the dependant and independent tasks. Processor and memory are shared with the nodes under heterogeneous distributed system environment. Scheduling schemes are used for the resource allocation process. Heterogeneous...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fuzzy Feature Clustering for Text Classification

    Feature clustering is the way to reduce the dimensionality of features presents in the text documents and it is highly important for text categorization problems. The performance of the text classification is degraded when the dimensionality of input text is huge .Feature clustering is a powerful alternative to feature reduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analyzing Product Rating Using Consumer Review

    The explosive increase in web communication has attracted technologies for automatically extracting personal feedbacks from web documents such as product reviews and web blogs. Such technologies would benefit users who seek reviews on certain consumer product of interest. On the other hand, in order to improve the quality of the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Personal Authentication Using Biometric Fusion

    It is a Biometric used to authenticate a person, fingerprint and palmprint which is unique and permanent throughout a person's life. A minutia matching is mostly used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. Palmprint matching is a challenging problem because latent prints large...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Streamlining of Multimedia Applications in Cloud Computing

    Cloud computing is a recent paradigm that is creating high expectations about benefits such as the pay per-use model and elasticity of resources. Correspondingly the video content is also becoming increasingly prevalent in the recent marketplace so, cloud with multimedia is a noteworthy and growing technology with attractive features. Multimedia...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    ACCCM: Adaptive and Co-Operative Cache Consistency Mechanism for Mobile Environment

    In mobile computing, caching plays a vital role owing to its ability to alleviate the performance and availability limitations of weakly-connected and disconnected operations. Caching the database data in MANET will enable the server to be aware of the cache distribution in the MANET, making the data items consistent with...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VLSI Design of 128-Point Pipeline FFT/IFFT Processor

    VHDL is an acronym for VHSIC Hardware Description language (VHSIC stands for Very High Speed Integrated Circuits). It is a hardware description language that can be used to model a digital system at many levels of abstraction ranging from the algorithmic level to the gate level. The complexity of the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Application of Multimodal Biometrics Supporting A Highly Secured and Authenticated Service in Automated Teller Machine (ATM)

    A multimodal biometrics iris, fingerprint and face recognition system is a computer application for automatically identifying or verifying a person from fingerprint by using sensors or fingerprint readers or fingerprint scanners, iris recognition by Charge Coupled Device (CCD) camera and face recognition using camera. This paper uses iris, face and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Fast and Accurate Detection of Fake Access Points Using Non-Crypto Method in WLAN

    The authors explore the use of clock skew of a wireless local area network Access Point (AP) as its finger print to detect unauthorized AP's quickly and accurately. The main goal behind using clock skews is to overcome one of the major limitations of existing solutions-the inability to effectively detect...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    EFDCB Algorithm Based QoS Routing in MANET

    A set of attributes related to the performance of the connection for each communication user can request a particular attribute each service is associated with a set of attributes. To find a feasible path between source and destination this satisfies the QoS requirements. The problem of routing based on a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Advanced RF/Baseband Interconnect Schemes for Inter- and Intra-ULSI Communications

    Future inter- and intra-ULSI interconnect systems demand extremely high data rates (up to 100 Gbps/pin or 20-Tbps aggregate) as well as bidirectional multi-I/O concurrent service, reconfigurable computing/processing architecture and total compatibility with mainstream silicon system-on-chip and system-in-package technologies. In this paper, the authors review recent advances in interconnect schemes that...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Circulated Client-Assisted Control Mission Optimization for Ungainly WLAN

    IEEE 802.11 WLANs are becoming more and more popular in homes and urban areas. As compared to traditional WLAN setups (such as in campuses) where knowledgeable network administrators can make centralized decisions on channel selection, Access Points (APs) in these networks are often deployed by network non-specialists in an uncoordinated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Processing and Analysis of Satellite Images To Detect Vegetation

    Satellite images have many applications like meterology, agriculture, geology, forestry, landscape warfare etc. Interpretation and analysis of satellite imagery is conducted using specialized remote sensing applications. In this paper, the authors have developed a technique which tries to extract useful information from large set of satellite images. They consider time...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Machine Learning Strategy for Throughput Improvement in Grid Computing

    Resource allocation and job scheduling are the core functions of grid computing. These functions are based on adequate information of available resources. Grid resource monitoring and grid resource prediction are the two mechanisms used. Grid resource state monitoring cares about the running state, distribution, load and malfunction of resources in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Throughput Optimization Using Parallelism and Packet Loss Recovery in WAN

    Using multiple parallel streams for wide area data transfers may yield much better performance than using a single stream, but overwhelming the network by opening too many streams may have an inverse effect. The congestion created by excess number of streams may cause a drop down in the throughput achieved....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis of Optical Network with Soliton Propagation in DCF and EDFA Based Network

    The advancement in optical communication by the emergence of soliton pulse propagation with its distinct feature of retaining its shape through long distance transmission, have brought in lot of interest and applications in the field of optics. The hurdle to major advancement was the usage of expensive regenerators which has...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Analysis Attack On Elliptic Curve'S Point Multiplication

    Information is becoming a crucial if not the most important resource of the economy and the society at large. Information can be copied without cost, it can be communicated at the speed of light and it can be destroyed without leaving traces. This poses new challenges for the protection of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Security and Privacy in Biometric Cryptosystems for Trusted Authentication

    In this paper, the authors introduces a novel fingerprint matching algorithm using both ridge features and the conventional minutiae features to increase the recognition performance against non-linear deformation in fingerprints. The proposed ridge features are composed of four elements: ridge count, ridge length, ridge curvature direction and ridge type. These...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Study On XML Based Context-Driven Search Engine for Web Data Mining

    There is an ever-growing availability of semi structured information on the Web and in digital libraries. Increasingly, users, both expert and non expert, have access to text documents equipped with some semantic hints through XML markup. Loosely structured querying allows combining some structural constraints within a Keyword query by specifying...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Replication in Binary Tree Based Peer-To-Peer Network

    Distributed Hash Tables (DHTs) share storage and routing responsibility among all nodes in a peer-to-peer network. These networks have bounded path length unlike unstructured networks. Unfortunately, nodes can deny access to keys or misroute lookups. The authors address both of these problems through replica placement. They characterize binary tree-based routing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering