International Journal of Communications and Engineering

Displaying 1-40 of 349 results

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Scheduling Algorithm for Minimizing The Queue Over-Flow Probability in Cellular Networks

    The use of optimization and economic ideas in network resource allocation has a long history, going back to the study of transportation networks. The proposal is to use as adaptation variables the components of rate for each path from source to destination. In this paper, a wireless scheduling algorithms for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multicast Content Delivery in Multimedia using Protocol Independent Multicast Sparse Mode (PIM-SM)

    Traffic Engineering is the emerging mechanism for the Internet Network Provider required optimizing network performance and traffic delivery. In the multicast communication the message is transferred from one sender to various active receivers instead of all receivers like broadcast communication. Traffic is a major problem in the multicast communication which...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Routing in Dynamic AODV Protocol for Predicting Route Lifetime

    A Mobile Ad-hoc NETwork is defined as a transient network which is formed dynamically by the collection of nodes which are arbitrary. It can also be called as infrastructure less network, because it has no structure frame for positioning the nodes, these nodes are combined and this union forms a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Minimizing Transmit Power Using Efficient and Reliable Routing Protocol in Wireless Sensor Networks for Avionics

    The main design issues for a sensor network are conservation of energy available at each sensor node. Nodes have limited energy and forward messages of different priorities are frequent in wireless sensor networks. In this paper, reliable selective forwarding is based on available battery, importance of messages, problems of interference...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Frequent Pattern Mining with Systolic Tree on Reconfigurable Platform

    In business, companies are working fast to gain a valuable competitive advantage over other businesses. A fast-growing and popular technology, which can help to gain this advantage, is data mining. Data mining technology allows a company to use the mass quantities of data that it has compiled and develop correlations...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Map-Reduce Function for Cloud Data Storage and Data Integrity Auditing by Trusted TPA

    Delivering IT-enabled services via the internet that are built for the end user to be in control is what has come to be called 'Cloud computing'. Computing resources such as processing power, storage, database and messaging are no longer confined within the four walls of an enterprise. Due to lack...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimisation of Path Using Genetic Algorithm for Wireless Sensor Networks

    In the wireless sensor networks, one of the most important and challenging problem in designing process is to develop an efficient routing protocol for providing the high traffic load which causes a data queue overflow in the sensor nodes. Since this queue overflow may causes data transmission failures, so to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Geographic Routing with Local Face Information without Planarization

    Geographic routing also called position-based routing is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. The paper designs new geographic routing algorithms, namely Greedy Distributed Spanning Tree Routing (GDSTR)...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mobility and Traffic Model Data Dissemination in Vehicular Networks

    Vehicular networks have great interest in the research community and multihop data dissemination has become an important issue. Vehicular adhoc network is a type of mobile adhoc network, in which mobile nodes forming temporary or short lived network without any fixed infrastructure. This paper proposed the concept of data dissemination...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improvisation of Fault Classification and Detection

    Software faults are a major threat for the dependability of software systems. When the authors intend to study the impact of software faults on software behavior, the issue of distinguishing faults categories and their frequency distribution arises immediately. For this clear detection, clear classification is needed. Very little is actually...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Retransmission Scheme for Wireless LANS

    In physical layer transmission scheme that drastically reduces the cost of retransmission by introducing network coding concepts to symbol level operation. It piggybacks a new packet on each retransmitted packet, and exploits the previously received packet (possibly with error) at the receiver to recover both the retransmitted packet and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reduced Time Approach for Interactive Postmining of Association Rules Using Ontologies

    Association rule mining is the oldest and a crucial task in data mining. In association rule mining, the latest trend is to reduce the number of association rules to a great extent. Algorithms tend to give a huge number of association rules making it intractable to the user to make...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Application of Wireless Sensor Networks for Process Control

    Currently the need of the hour is how the emerging technologies going to change the existing system. This is an important idea which has been focused by many developers and research scholars. A Wireless Sensor Network (WSN) is a wireless network consisting of different devices that use sensors to monitor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cryptanalysis on RSA Algorithm

    RSA is one of the mathematical algorithms that faced the requirements for public application that is valuable in sending information key cryptosystems. The RSA scheme is a block via insecure channels, which is counted as the cipher in which the original message and cipher worse case used in the e-commerce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Text Document Clustering in Distributed Peer Networks

    Text mining is a way to identify new, previously unknown information by applying techniques from natural language processing and data mining. But most of the techniques for text mining are based on statistical analysis for a word or phrase. If two terms have the same frequency in the documents, then...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    CIMDS: Adapting Postprocessing Techniques for Malware Detection

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, Trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Trust Based Authentication Technique for Security in Wimax Networks

    In WiMAX networks, security is one of the major challenges. The existing techniques address authentication to reduce the possibilities of attacking both base station and subscriber station. But in these techniques, authentication results in more delay and overhead. Also the authentication between the base station and subscriber station is not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Literature Survey on Throughput and Delay in Wireless Sensor Networks

    Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. However, other studies show that the transmission delay increases with the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    LTE Broadcast Channel Design Using System Generator

    System-level simulation has been widely used to evaluate the comprehensive performance of different mobile cellular systems up. In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. WiMax 802.16m and LTE-A is 4G technology which satisfies International Mobile Telecommunication Standards of 4G. 3GPP released...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Bandwidth Allocation for Wireless System Through Periodic Scheduling Policies

    Reservation-based channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless real-time applications. Reservation based channel access is energy-efficient since a wireless adaptor is powered on only during its exclusive channel access time. Keeping the bandwidth reservation of a node to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel Aware Routing With Dynamic Data Rate Control in Manets

    In wireless Mobile Ad hoc NETworks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol to accommodate channel fading. Specifically, the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel average...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel-Aware Multipath Routing in Mobile Ad Hoc Networks

    In MANETs, routing protocols exploit multi-hop paths to route packets. The probability of successful packet transmission on a path is dependent on the reliability of the wireless channel. The existing paper deals with multi-path routing protocol AOMDV (Ad hoc On-Demand Multi-path Distance Vector) which is an extension of AODV. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Transparent Error Correction Based Qecc for Communication Between Data Centers

    Commodity clusters running high-performance applications, connected by high-speed "Lambda" networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple applications and protocols. Maelstrom Error Correction means a rack of proxies residing between a data center and its WAN link. Maelstrom encodes FEC packets over traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Combined Scheme for Route Establishment Using Node Position, ACO and MAS

    Mobile Ad hoc NETwork (MANET) consists of nodes which communicate with other nodes using wireless transmitters in the absence of a fixed infrastructure. All nodes can serve as routers for each other and data packets are forwarded from node to node in a multi-hop fashion. The main problem in MANET...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Frequent Pattern Approach for Mining Association Rules

    An important aspect of data mining is to discover association rules among large number of item sets. Association rules are if/then statements that help uncover relationships between seemingly unrelated data in a relational database or other information repository. The main problem is the generation of candidate set. The Frequent Pattern...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Evaluation of AES Algorithm as a Peripheral in SOC

    The Advanced Encryption Standard (AES)is a symmetric block cipher operating on fixed block sizes of 128Bit and is specified for key sizes of 128, 192 and 256 Bit designed by Joan Daemen and Vincent Rijmen. The algorithm was standardized by National Institute of Standards and Technology (NIST). This component implements...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Elliptic Curve Cryptography Over Binary Field

    Elliptic Curve Digital Signature Algorithm (ECDSA) is implemented on an Altera Cyclone II EP2C20F672C6 FPGA using a DE2 development and education board. Digital signatures are digital counterparts of handwritten signatures. They provide proof of authorship and authenticity and they are unforgeriable. They also provide proof that the document has not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evolutionary Fuzzy Based System for Detecting Malicious Web Pages

    Internet became a platform for fast communication and information transactions. Web pages undergo constant dynamic transformations. Due to this reason, it has become attackers preferred pathway for installing illicit products. It also made the intruders to use World Wide Web to hack or attack a client's system. Malwares may be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constant Time Contention Mechanism for Efficient Throughput in 802.11 Mac Protocol

    In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Location Aided Routing in High Mobility of Adhoc Network

    The network topology in an ad hoc network is highly dynamic due to the movement of the nodes; hence mobility is a major constraint in designing routing protocols for them. Apart from mobility, the other major constraints are bandwidth and resource availability. In literature many routing protocols have been proposed...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intrusion Detection and Auto Response Using a Genetic Classifier Approach

    Intrusion is actually detecting anomalies user and other anomalies that exists in a system. In most situations, it is very difficult to realize or detect such differences before any damage occurs during break-ins. A genetic classifier -based intrusion detection system, provides active detection and automated responses during intrusions. It is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Computing Process Execution in Multicloud Environment

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Scheduling and Security Mechanism for Multi Dimensional Resource Environment

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Resources are allocated for the dependant and independent tasks. Processor and memory are shared with the nodes under heterogeneous distributed system environment. Scheduling schemes are used for the resource allocation process. Heterogeneous...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    AP Centric and Deputy Forward Method for Location Oriented Content Delivery

    In this paper, a delay-sensitive service is introduced that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of Access Points (APs) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably introduce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Network Intrusion Detection Using Enhanced Adaboost Algorithm

    Network intrusion detection is a way to separate normal behaviors from the attacked ones. An Intrusion Detection System (IDS) gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions which are attacks from outside the organization and misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Intrusion Detection Framework To Avoid SQL Injection Attacks Using WASP Tool

    SQL injection attacks pose a serious threat to the security of Web applications because they can give attackers unrestricted access to databases that contain sensitive information. In this paper, the authors propose a new, highly automated approach for protecting existing Web applications against SQL injection. Their approach has conceptual advantages...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Bandwidth Efficient ANCR Scheme for Multi-Hop Wireless MBS

    In a wireless multi-hop environment the bandwidth requirement changes continuously and rapidly in each node. And also the network consumes a lot of bandwidth during multicast broadcast services. So a bandwidth and an energy efficient scheme called ANCR is deployed using network coding. The ANCR scheme uses two heuristic schemes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Personalized Ontology Model for Web Information Gathering

    For knowledge description and user profiles representation, ontology's are used in web information gathering. When representing user profiles, many models have utilized only knowledge from either a global knowledge base or user local information. The objective of this paper is to improve web information gathering performance by using ontological user...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Database Response Policies To Support Intrusion Response System for DBMS

    The intrusion response system is responsible for issuing a suitable response to an anomalous request. The interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues are address...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dual-Band Microstrip Patch Array Antenna Design for LTE and WLAN Application

    In this paper, a dual-band microstrip patch array antenna is designed for both the MIMO 4G LTE and the WLAN systems. Design simulation and optimization processes are carried out with the aid of the Advanced Design System (ADS) electromagnetic simulator .The losses that are caused by both the substrate and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Xquery Processing in Very Large XML Databases

    XML is flexible and powerful tool that enables vital security in heterogeneous environments. The availability of large amounts of heterogeneous web data necessitates the integration of xml data from multiple xml sources. The authors need merge, or make an effort to service customers in cooperation; there is need for an...

    Provided By International Journal of Communications and Engineering