International Journal of Communications and Engineering

Displaying 1-40 of 349 results

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Query Performance Using Semantic Overlay Creation

    In a Peer-To-Peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding tends to be very expensive. In this paper it is proposed that node connections be influenced by content, so that for example, nodes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Countermeasure Against Parasitic Adversaries in Wireless Sensor Network

    Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, the authors first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a counter-measure, they first...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Digital PID Feedback Controller for a Buck Converter

    The design of a digital controller is presented for a dc-dc converter. Digital control of dc-dc converter using DSP is becoming more and more common in industry today. Starting with a dc-dc buck converter and a given set of performance specifications, a digital PID controller is designed and implemented in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Layer Conflict Detecting by Improve the Routing Performance

    Cross layer conflicts occur due to mismatch or misalignment of routing objectives. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load. In the authors' work, they build on past...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Protocol for Remote Data Possession Checking in Cloud

    Cloud storage enables users to remotely store their data without the burden of local hardware and software management. Once data goes into the cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. While previously proposed protocols fail to provide strong security assurance...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy in Mobile Social Networking

    Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of Smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    License Authentication Security System Using RFID

    This paper describes the theft of two wheeler vehicles probably causes less anxiety to the public than household burglary, it is a crime which occurs one and half times more frequently than other thefts. This report examines, for a technical readership, the security weaknesses of existing vehicle designs and considers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Web Mining Using Page Rank Algorithm Based Genetic Relation Algorithm

    Data mining is a new method in retrieving the knowledge from the large database. Data mining nowadays plays an important role in searching the information on the web that includes a high variety of data types. For reaching this goal, data mining techniques has been used as web mining. As...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralised Approach for Service Composition in Wireless Sensor Networks

    Wireless sensor network is a highly distributed network with small wireless nodes that are deployed in large numbers to monitor the environment by measurements of physical parameters. Wireless sensor networks have limited bandwidth, processing power and energy. Each node in the wireless sensor network may provide multiple services that when...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Jamming Detection and Mitigation Using Code Tree in Wireless Broadcast Networking

    Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric-operations: a user that possesses the key to decode a transmission can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Characteristic Based Modelling Approach for Social Networking Management Using Objectmodelling Technology

    Social networking systems are of modern day interest to the fast growing IT Sector. The paper proposes a set of diagrams based on object orientation principle which describes hardware and software functionalities. The diagrams depicts the functional, behavioral and structural aspects of the embedded electronics system. The proposed modeling methodology...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

    k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Critical Event Monitoring in Wsnusing Sleep Scheduling

    This paper explores a novel sleep scheduling method to reduce the delay of alarm broadcasting from any sensor node in WSNs. When a critical event occurs, an alarm message should be broadcast to the entire network. Specifically, there are two determined traffic paths for the transmission of alarm message, and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Sensor Network Queries With Contest Free Transmission

    In wireless sensor networks the performance of query services is increased due to the emergence of high data rate sensor network applications. To meet this challenge, a Dynamic Conflict free Query Scheduling (DCQS), this is a novel scheduling technique for queries in wireless sensor networks. DCQS is specifically designed for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Automated Personal Identification Using Fusion of Iris

    Biometrics are measurable in physiological and or behavioral characteristics and can be used to verify the identity of the individual. Proposed work based on personal identification approaches using iris images. Approaches related to both canny edge detection and parabolic Hough transform to detect the iris boundaries in the eye's digital...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Computing Process Execution in Multicloud Environment

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing in Mobile Ad-hoc Cognitive Radio Networks

    Recent research activities about Cognitive Radio (CR) are mainly focusing on opportunistic spectrum access and spectrum utilization. However, CR technology will have significant impacts on upper layer performance in wireless networks, especially in Mobile Ad-hoc NETworks (MANETs). In this paper, the authors study topology control and routing issues in CR-MANETs...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving QoS for MANET By Using Energy Conserved Cluster Scheme

    Now-a-days, wireless networks are becoming more popular and it can be used in all real world applications. So it is necessary to provide a good Quality of Service (QOS) for delivering a voice, video and data. To provide different types of priority to different types of applications, QoS will provide...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Passenger Assisting System

    Advanced cell phones systems are developing to support the people to live in semi-independent and independent environments also it perform essential Activities for Daily Livings (ADLs). The approach taken is regarding context-aware and sensor enriched environments for home and medical care settings. It generally focused on the following goals, providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximizing The Performance of Wireless Ad Hoc Networks Using ALOHA and CSMA Protocols

    The performances of the MA protocols are analyzed in wireless ad-hoc networks. The main objective is correct reception of packets at its intended receiver in wireless adhoc network and the analysis is made in terms of throughput, delay and outage probability. In particular, two MAC protocols, ALOHA and Carrier Sense...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Hybrid Job Scheduling Strategy for Computational Grid Environment

    Grid computing is an extensive technology which has the potential to solve large scale scientific problems in an integrated heterogeneous environment. For such an infrastructure, efficient scheduling of jobs and management of resources serve as the key aspects to improve the efficiency and to exploit the capabilities of the emergent...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimal Protocol for Cloud Cache Services

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy-Efficient Dynamic Data Aggregation and Routing Trees for WSN

    Analysis and construction of localized, self organizing, robust and energy-efficient data aggregation tree approaches for sensor networks, named as Localized Power-Efficient Data Aggregation Protocols (L-PEDAPs). They are based on topologies, such as LMST and RNG, that can approximate minimum spanning tree and can be efficiently computed using only position or...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Parallel Data Processing Protocol Using Dynamic Resource Allocation Tool

    Cloud computing has emerged as the most apt solution for businesses and services because of reduced costs. Software and Hardware have been used as services in cloud computing. - IAAS (Infrastructure As A Service). As clouds reduce load on the client both in terms as software or hardware, the server...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximizing The Lifetime of Wireless Sensor Networks by Specific Routing

    In Wireless Sensor Networks, nodes have limited energy. Nodes can forward messages based on the available energy. This paper develop selective message forwarding schemes. This scheme will depend on parameters such as the available battery at the node, the energy cost of retransmitting a message, or the importance of messages....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Scheduling Algorithm for Minimizing The Queue Over-Flow Probability in Cellular Networks

    The use of optimization and economic ideas in network resource allocation has a long history, going back to the study of transportation networks. The proposal is to use as adaptation variables the components of rate for each path from source to destination. In this paper, a wireless scheduling algorithms for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multicast Content Delivery in Multimedia using Protocol Independent Multicast Sparse Mode (PIM-SM)

    Traffic Engineering is the emerging mechanism for the Internet Network Provider required optimizing network performance and traffic delivery. In the multicast communication the message is transferred from one sender to various active receivers instead of all receivers like broadcast communication. Traffic is a major problem in the multicast communication which...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Routing in Dynamic AODV Protocol for Predicting Route Lifetime

    A Mobile Ad-hoc NETwork is defined as a transient network which is formed dynamically by the collection of nodes which are arbitrary. It can also be called as infrastructure less network, because it has no structure frame for positioning the nodes, these nodes are combined and this union forms a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Minimizing Transmit Power Using Efficient and Reliable Routing Protocol in Wireless Sensor Networks for Avionics

    The main design issues for a sensor network are conservation of energy available at each sensor node. Nodes have limited energy and forward messages of different priorities are frequent in wireless sensor networks. In this paper, reliable selective forwarding is based on available battery, importance of messages, problems of interference...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Transparent Error Correction Based Qecc for Communication Between Data Centers

    Commodity clusters running high-performance applications, connected by high-speed "Lambda" networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple applications and protocols. Maelstrom Error Correction means a rack of proxies residing between a data center and its WAN link. Maelstrom encodes FEC packets over traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Combined Scheme for Route Establishment Using Node Position, ACO and MAS

    Mobile Ad hoc NETwork (MANET) consists of nodes which communicate with other nodes using wireless transmitters in the absence of a fixed infrastructure. All nodes can serve as routers for each other and data packets are forwarded from node to node in a multi-hop fashion. The main problem in MANET...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Frequent Pattern Approach for Mining Association Rules

    An important aspect of data mining is to discover association rules among large number of item sets. Association rules are if/then statements that help uncover relationships between seemingly unrelated data in a relational database or other information repository. The main problem is the generation of candidate set. The Frequent Pattern...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Evaluation of AES Algorithm as a Peripheral in SOC

    The Advanced Encryption Standard (AES)is a symmetric block cipher operating on fixed block sizes of 128Bit and is specified for key sizes of 128, 192 and 256 Bit designed by Joan Daemen and Vincent Rijmen. The algorithm was standardized by National Institute of Standards and Technology (NIST). This component implements...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Elliptic Curve Cryptography Over Binary Field

    Elliptic Curve Digital Signature Algorithm (ECDSA) is implemented on an Altera Cyclone II EP2C20F672C6 FPGA using a DE2 development and education board. Digital signatures are digital counterparts of handwritten signatures. They provide proof of authorship and authenticity and they are unforgeriable. They also provide proof that the document has not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improvisation of Fault Classification and Detection

    Software faults are a major threat for the dependability of software systems. When the authors intend to study the impact of software faults on software behavior, the issue of distinguishing faults categories and their frequency distribution arises immediately. For this clear detection, clear classification is needed. Very little is actually...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Retransmission Scheme for Wireless LANS

    In physical layer transmission scheme that drastically reduces the cost of retransmission by introducing network coding concepts to symbol level operation. It piggybacks a new packet on each retransmitted packet, and exploits the previously received packet (possibly with error) at the receiver to recover both the retransmitted packet and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reduced Time Approach for Interactive Postmining of Association Rules Using Ontologies

    Association rule mining is the oldest and a crucial task in data mining. In association rule mining, the latest trend is to reduce the number of association rules to a great extent. Algorithms tend to give a huge number of association rules making it intractable to the user to make...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Application of Wireless Sensor Networks for Process Control

    Currently the need of the hour is how the emerging technologies going to change the existing system. This is an important idea which has been focused by many developers and research scholars. A Wireless Sensor Network (WSN) is a wireless network consisting of different devices that use sensors to monitor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cryptanalysis on RSA Algorithm

    RSA is one of the mathematical algorithms that faced the requirements for public application that is valuable in sending information key cryptosystems. The RSA scheme is a block via insecure channels, which is counted as the cipher in which the original message and cipher worse case used in the e-commerce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Text Document Clustering in Distributed Peer Networks

    Text mining is a way to identify new, previously unknown information by applying techniques from natural language processing and data mining. But most of the techniques for text mining are based on statistical analysis for a word or phrase. If two terms have the same frequency in the documents, then...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    CIMDS: Adapting Postprocessing Techniques for Malware Detection

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, Trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Trust Based Authentication Technique for Security in Wimax Networks

    In WiMAX networks, security is one of the major challenges. The existing techniques address authentication to reduce the possibilities of attacking both base station and subscriber station. But in these techniques, authentication results in more delay and overhead. Also the authentication between the base station and subscriber station is not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Literature Survey on Throughput and Delay in Wireless Sensor Networks

    Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. However, other studies show that the transmission delay increases with the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evolutionary Fuzzy Based System for Detecting Malicious Web Pages

    Internet became a platform for fast communication and information transactions. Web pages undergo constant dynamic transformations. Due to this reason, it has become attackers preferred pathway for installing illicit products. It also made the intruders to use World Wide Web to hack or attack a client's system. Malwares may be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constant Time Contention Mechanism for Efficient Throughput in 802.11 Mac Protocol

    In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Location Aided Routing in High Mobility of Adhoc Network

    The network topology in an ad hoc network is highly dynamic due to the movement of the nodes; hence mobility is a major constraint in designing routing protocols for them. Apart from mobility, the other major constraints are bandwidth and resource availability. In literature many routing protocols have been proposed...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intrusion Detection and Auto Response Using a Genetic Classifier Approach

    Intrusion is actually detecting anomalies user and other anomalies that exists in a system. In most situations, it is very difficult to realize or detect such differences before any damage occurs during break-ins. A genetic classifier -based intrusion detection system, provides active detection and automated responses during intrusions. It is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    LTE Broadcast Channel Design Using System Generator

    System-level simulation has been widely used to evaluate the comprehensive performance of different mobile cellular systems up. In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. WiMax 802.16m and LTE-A is 4G technology which satisfies International Mobile Telecommunication Standards of 4G. 3GPP released...

    Provided By International Journal of Communications and Engineering