International Journal of Communications and Engineering

Displaying 41-80 of 349 results

  • White Papers // Mar 2012

    Modified Autonomous Network Reconfiguration System for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. During their lifetime, multihop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications' bandwidth demands. Modified Autonomous network Reconfiguration System...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Low Power Fir Filter Using Improved Carry Select Adder

    Design of area- and power efficient high-speed data path logic system forms the largest areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to transmit a carry through the adder. Carry SeLect Adder (CSLA) is one of the fastest...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting the Data Leakage Using Fake Objects

    A data distributor has given sensitive data to a set of supposedly trusted agents. Some of the data are leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from one or more agents as opposed to having been independently gathered by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving of Digital Data Using Complex Non Linear Adaptive Filtering

    In the Field of Signal Processing in Encrypted Domain (SPED) has emerged in order to provide efficient and secure solutions for preserving privacy of signals that are processed by untrusted agents. In this work, privacy problem of adaptive filtering is one of most important and ubiquitous blocks in signal processing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Different Privacy Preserving Methods in Cloud Environment

    Peoples enjoy the full benefits of Cloud computing if they can address the very real privacy and security concerns that come along with storing sensitive personal information in databases and software scattered around the Internet. It provides convenient on-demand network access to a shared pool of configurable computing resources that...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving True Query-Cluster Distance Bound by Optimizing Clustering Algorithm

    Clustering approach is represented for the analysis of similarity between the information within the database of any dimension. In order to have an effective a similarity search on a high dimensional database where exists correlated data, have to improve or extend the conventional clustering methods with different approaches. There have...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Designing a Secure and Effective Throughput Model for Intrusion Detection in Manet

    Recent year a rapid development and wide-spread application of mobile ad-hoc networks suffer from security attacks and privacy issues which dramatically impede their applications. Clustering methods allow fast connection, better routing and topology management of Mobile Ad-hoc Networks, but the traffic in between the cluster heads decreases the throughput. This...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    On Performance Analysis of LTE System Based Preceding Matrix Indicator

    This paper presents an efficient method for calculating the Precoding Matrix Indicator (PMI) at the receiver. The PMI is required for MIMO precoding in the downlink of a 3GPP LTE system. The authors' method is based on maximizing the mutual information between the transmitted and received symbols with respect to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for QoS Aware Semantic Web Services

    Resource allocation and job scheduling are the core functions of grid computing. These functions are based on adequate information of available resources. Timely acquiring resource status information is of great importance in ensuring overall performance of grid computing. This paper aims at building a distributed system for grid resource monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Data Delegation and Data Storage Security in Cloud Computing

    Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data-center resources, uphold user privacy, and preserve data integrity. The work suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Way of IP Traceback of DDOS Attacks Based on Entropy Variation

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. It is extremely hard to traceback the attackers because of memoryless feature of the internet routing mechanisms. As a result, there is no effective and efficient method to deal with this issue .In this paper, traceback of the attackers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Proposed CISGA and DGSA Algorithm for Infrastructure - BASED Cognitive Radio Network

    This paper propose a joint scheduling and infrastructure based cognitive radio network in coexistence with a cellular primary radio network. The problem is formulated to maximise the spectrum utilization of secondary user without causing an excessive interference to active primary user of the PRN. The authors going to minimises the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Error Correction Scheme Based on Keyboard Scan Decoding for NOCS With Type Ii HARQ

    The increasing probability of multi-bit interconnect errors in nanoscale technology will require the use of more powerful error control coding methods. For this, product code concept using extended hamming code can correct multiple errors using low complexity hardware. Decoding of the proposed work is based on keyboard scan method instead...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis and Design of Fault Tolerance Mechanism With Fast Restart

    As systems became more complex the failure rate keeps increasing. Checkpointing represents a very effective solution to assure the continuity of distributed and parallel applications in the occurrence of failures. Checkpoint/Restart is a fault tolerance technique and mainly focuses on optimizing checkpoint operation not on restart operation. As a result,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Dimensional Data Clustering With Dynamic Error Threshold Estimation Model

    Genes are considered as high dimensional data. Clustering high dimensional data is very challenging especially when the data is skewed. The existing system consists of popular algorithms like k-means and CAST. Implementing these algorithms for a large genome-scale gene expression data set is practically impossible. A novel method for clustering...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Route Maintenance for Sensor Networks

    Data information's are sent from one system to another without any security bleaching or malicious attacks. Currently Topology Maintenance Protocol is used for information transformation. Topology Maintenance Protocol increase the life time of the sensor network by only maintaining a subset of nodes in an active or awake state. TMPs...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Optimized Profile Based Online Data Delivery

    The diversity of data sources and Web services currently available on the Internet. In this paper, the authors develop a framework for comparing pull based solutions and present dual optimization approaches. The first approach maximizes user utility while satisfying constraints on the usage of system resources. The second approach satisfies...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Realtime Intrusion Detection for Wireless Networks Based on Aodv Routing Protocol

    Security of wireless ad hoc network over insecure communication channel is a challenging task. In this paper, some of the threats to wireless ad hoc networks and specifically, some attacks against the AODV routing protocol re discussed. AODV tool is aimed at real-time detection of these attacks. This tool monitors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Path Based Energy Efficient Fast Reconfiguration Mechanism in Wireless Mesh Network

    Frequent link failures are experienced in multi-hop wireless networks, due to channel interference, dynamic obstacles and bandwidth demands. These failures cause severe performance degradation in wireless mesh network, which needs manual network management for recovery. An Autonomous network Reconfiguration System (ARS) algorithm is proposed in this paper, to overcome the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secrecy and Cooperative Firewall Policies in Virtual Private Network

    Virtual Private Network (VPN) is a globally used technology allows the user to create encrypted tunnel. CDCF (Cross-Domain Cooperative Firewall) is vulnerable to selective policy updating attacks, by which the policy owner can quickly reveal the request of the other party. Furthermore, CDCF is inefficient because it uses commutative encryption...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi-Populated Parallel Genetic Algorithm for Outlier Detection

    Outlier detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. Fundamental issue is that the notion of objects that are outliers typically varies between users, problems, domains or even datasets. Various researches have been carried out with different methods for outlier detection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Virtual Systems Workload Characterization

    Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single workload benchmark is useful in quantifying the virtualization overhead within a single VM, but not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Data Retrieval Clustering Based Anomaly Intrusion Detection System in Mining Process With Time Prediction

    A network intrusion is any type of attack or malicious activity that can compromise the stability or security of a network environment. Intruders can be classified in two groups. External intruders don't have authorized access to the system or network they attack, while internal intruders have some authority access to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Conflict-Free Transmission With Dynamic Scheduling for Sensor Network Queries

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Privacy and Authorization in Grid Using Advanced Encryption Standard

    The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Microprocessor Cache Compression by Cellular Automata P-Match to Increase the Cache Capacity

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multiprocessors are used in the system design, more processors require more accesses to memory. Thus raising a, 'Wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip cache, two...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Methods for Handling Uncertainty in Decision Support System

    Data uncertainty is common in real world applications due to various causes, including imprecise measurements, network latency, out dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. In this paper, the authors are describing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

    The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Update for Anonymous Database

    Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process. Privacy preservation is applied to protect individual private information. Statistical and Anonymization...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Feature Set Based Classification Scheme Under Data Streams

    Classification techniques are used to identify the class labels for the transactions. The classification operations are applied on the database transactions. Data streams are one of the major data source for many applications. The data values are collected from one or more sources. The data stream classification is a complex...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

    Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for Parallel Data Processing in Cloud Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Data Security Impact and in Parallel Cloud Computing

    Cloud Computing users can access database resources via the Internet from anywhere, as long as they need without worrying about any maintenance or management of actual resources. Besides, databases in cloud are very dynamic and scalable. The people early thoughts on interconnecting clouds for dynamically creating an atmospheric computing environment...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Model of Intelligent Hybrid Network Intrusion Detection System

    The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered on attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Multiple Level Visual Cryptography Scheme for Biometric Privacy Without Pixel Expansion

    Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Diversity Multiplexing Trade Off Analysis of Multi User Wireless Network With and Without MCM

    This paper is used to improve the diversity order of the multi user wireless network to combat the fading in the wireless channel by using Multi Carrier Modulation (MCM). The wireless network contains multiple sources, multiple relays, and one common destination. To reduce the fading, the technique such as diversity...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    JATA - Multiple Path Routing for Jamming of Wireless Networks

    Robust network operation and the ability to provide user and data security while under attack are desirable qualities of network protocols. However, these qualities require a fundamental understanding of network protocol vulnerabilities and characterization of the space of possible attacks. Hence, understanding attacks and their impact is a necessary prerequisite...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VHDL Simulation of Reset Automatic Block, 64bit Latch Block, and Test Complete Blocks ForPD Detection Circuit System Using FPGA

    This paper is purely a model to determine the design circuit to implement Partial Discharge (PD) detection in FPGA technology. The research shall involve ISE Simulator version 10.1i (Xilinx) and ISE Xilinx Synthesized Technology (XST)using Very high integrated circuit Hardware Description Language (VHDL) programming to evaluate the use of Field...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymity and Traceability in Wireless Peer-to-Peer Networks

    Anonymity and traceability is more important in payment based systems such as e-cash and peer-to-peer systems. Anonymity provides protection for the users while accessing in the network services and provide the user's awareness of their privacy. It is used to trace the misbehavior users in the networks. Anonymity is also...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing Based on Rateguard in Wireless Mesh Networks

    Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Microprocessor Cache Compression by Cellular Automata P-Match to Increase the Cache Capacity

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multiprocessors are used in the system design, more processors require more accesses to memory. Thus raising a, 'Wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip cache, two...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Methods for Handling Uncertainty in Decision Support System

    Data uncertainty is common in real world applications due to various causes, including imprecise measurements, network latency, out dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. In this paper, the authors are describing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

    The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Update for Anonymous Database

    Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process. Privacy preservation is applied to protect individual private information. Statistical and Anonymization...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Feature Set Based Classification Scheme Under Data Streams

    Classification techniques are used to identify the class labels for the transactions. The classification operations are applied on the database transactions. Data streams are one of the major data source for many applications. The data values are collected from one or more sources. The data stream classification is a complex...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

    Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for Parallel Data Processing in Cloud Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Data Security Impact and in Parallel Cloud Computing

    Cloud Computing users can access database resources via the Internet from anywhere, as long as they need without worrying about any maintenance or management of actual resources. Besides, databases in cloud are very dynamic and scalable. The people early thoughts on interconnecting clouds for dynamically creating an atmospheric computing environment...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Model of Intelligent Hybrid Network Intrusion Detection System

    The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered on attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Multiple Level Visual Cryptography Scheme for Biometric Privacy Without Pixel Expansion

    Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Diversity Multiplexing Trade Off Analysis of Multi User Wireless Network With and Without MCM

    This paper is used to improve the diversity order of the multi user wireless network to combat the fading in the wireless channel by using Multi Carrier Modulation (MCM). The wireless network contains multiple sources, multiple relays, and one common destination. To reduce the fading, the technique such as diversity...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    JATA - Multiple Path Routing for Jamming of Wireless Networks

    Robust network operation and the ability to provide user and data security while under attack are desirable qualities of network protocols. However, these qualities require a fundamental understanding of network protocol vulnerabilities and characterization of the space of possible attacks. Hence, understanding attacks and their impact is a necessary prerequisite...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VHDL Simulation of Reset Automatic Block, 64bit Latch Block, and Test Complete Blocks ForPD Detection Circuit System Using FPGA

    This paper is purely a model to determine the design circuit to implement Partial Discharge (PD) detection in FPGA technology. The research shall involve ISE Simulator version 10.1i (Xilinx) and ISE Xilinx Synthesized Technology (XST)using Very high integrated circuit Hardware Description Language (VHDL) programming to evaluate the use of Field...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymity and Traceability in Wireless Peer-to-Peer Networks

    Anonymity and traceability is more important in payment based systems such as e-cash and peer-to-peer systems. Anonymity provides protection for the users while accessing in the network services and provide the user's awareness of their privacy. It is used to trace the misbehavior users in the networks. Anonymity is also...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing Based on Rateguard in Wireless Mesh Networks

    Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute the path metric and forward data. The assumption that all nodes are honest and behave correctly during metric computation, propagation, and aggregation, as...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Security and Performance in the TOR Network Through Opportunistic Bandwidth Measurement Mechanism

    Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both more secure and performs better, both in terms of observed performance and in terms of achievable anonymity and provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. This paper proposes improvements to the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reliability and Securing Topology Maintenance Protocols for Sensor Network

    The authors analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known Topology Maintenance Protocols (TMPs) for sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Internal Coupled-FED Antenna for GSM/UMTS/LTE Operation for Tablet Computer

    Antennas for mobile handsets is generally required to have such characteristics as compactness, complete built-in mountability, multiband operation and environment isolation as well as broadband bandwidth and high efficiency. A coupled-fed shorted monopole with its feed structure as an effective radiator for eight-band LTE/WWAN operation in the laptop computer is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Ontology Based E-Learning for Cloud Environment

    E-Learning is the use of technology to enable people to learn anytime and anywhere. E-Learning can include training, the delivery of just-in-time information and guidance from experts. E-learning is popular among the people because of its flexibility in learning and in the time convention of individual learning. Hence, this paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multivariant Execution Environment Against Code Injectionattacks

    As the number and complexity of attacks on computer systems are increasing, this growth necessitates proper defense mechanisms. Intrusion detection systems play an important role in detecting and disrupting attacks before they can compromise software. Multivariant execution is an intrusion detection mechanism that executes several slightly different versions, called variants,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Load Distribution Over Multipath Networks to Control the Delay

    An effective model of delay-controlled Load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known to be sensitive to packet delay, packet delay variation, and packet reordering. Recent research on load distribution has focused on load balancing efficiency, bandwidth...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Cross-Layer Based Improved TCP Protocol for Multi Hop Wireless Ad Hoc Networks

    The congestion handling is the biggest single issue that makes the traditional Transmission Control Protocol (TCP) a poor choice for ad hoc wireless networks. In wireless ad hoc networks, if the packet loss occurs frequently for any reason, the size of TCP congestion window will stay at very low level...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adaptive Rate Control Cryptographic Active Voice Transcoding (ARC-CAVT) Congestion Control Mechanism for Voice Over IP (VOIP) Transmission - A Case Study

    The quality of bulky real time voice communication over an IP network degrades due to packet header overhead, network congestion and improper queuing strategies. These overheads affect the overall IP network performance and QoS parameters of voice communication such as packet loss, packet delay and packet latency or jitter. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Query Performance Using Semantic Overlay Creation

    In a Peer-To-Peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding tends to be very expensive. In this paper it is proposed that node connections be influenced by content, so that for example, nodes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Countermeasure Against Parasitic Adversaries in Wireless Sensor Network

    Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, the authors first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a counter-measure, they first...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Digital PID Feedback Controller for a Buck Converter

    The design of a digital controller is presented for a dc-dc converter. Digital control of dc-dc converter using DSP is becoming more and more common in industry today. Starting with a dc-dc buck converter and a given set of performance specifications, a digital PID controller is designed and implemented in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Layer Conflict Detecting by Improve the Routing Performance

    Cross layer conflicts occur due to mismatch or misalignment of routing objectives. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load. In the authors' work, they build on past...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Protocol for Remote Data Possession Checking in Cloud

    Cloud storage enables users to remotely store their data without the burden of local hardware and software management. Once data goes into the cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. While previously proposed protocols fail to provide strong security assurance...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy in Mobile Social Networking

    Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of Smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    License Authentication Security System Using RFID

    This paper describes the theft of two wheeler vehicles probably causes less anxiety to the public than household burglary, it is a crime which occurs one and half times more frequently than other thefts. This report examines, for a technical readership, the security weaknesses of existing vehicle designs and considers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Web Mining Using Page Rank Algorithm Based Genetic Relation Algorithm

    Data mining is a new method in retrieving the knowledge from the large database. Data mining nowadays plays an important role in searching the information on the web that includes a high variety of data types. For reaching this goal, data mining techniques has been used as web mining. As...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralised Approach for Service Composition in Wireless Sensor Networks

    Wireless sensor network is a highly distributed network with small wireless nodes that are deployed in large numbers to monitor the environment by measurements of physical parameters. Wireless sensor networks have limited bandwidth, processing power and energy. Each node in the wireless sensor network may provide multiple services that when...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Jamming Detection and Mitigation Using Code Tree in Wireless Broadcast Networking

    Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric-operations: a user that possesses the key to decode a transmission can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Characteristic Based Modelling Approach for Social Networking Management Using Objectmodelling Technology

    Social networking systems are of modern day interest to the fast growing IT Sector. The paper proposes a set of diagrams based on object orientation principle which describes hardware and software functionalities. The diagrams depicts the functional, behavioral and structural aspects of the embedded electronics system. The proposed modeling methodology...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

    k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Critical Event Monitoring in Wsnusing Sleep Scheduling

    This paper explores a novel sleep scheduling method to reduce the delay of alarm broadcasting from any sensor node in WSNs. When a critical event occurs, an alarm message should be broadcast to the entire network. Specifically, there are two determined traffic paths for the transmission of alarm message, and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Sensor Network Queries With Contest Free Transmission

    In wireless sensor networks the performance of query services is increased due to the emergence of high data rate sensor network applications. To meet this challenge, a Dynamic Conflict free Query Scheduling (DCQS), this is a novel scheduling technique for queries in wireless sensor networks. DCQS is specifically designed for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Automated Personal Identification Using Fusion of Iris

    Biometrics are measurable in physiological and or behavioral characteristics and can be used to verify the identity of the individual. Proposed work based on personal identification approaches using iris images. Approaches related to both canny edge detection and parabolic Hough transform to detect the iris boundaries in the eye's digital...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Socionet Using Cluster Based Intelligent Search Algorithm

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources. They can be roughly classified as either structured or unstructured networks. Without stringent constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Reduction Using Adaptive Clustering In Sensor Networks

    In many applications of Wireless Sensor Networks (WSNs), it is necessary to continuously extract data from the networks. It is expensive to obtain all sensor readings. Clustering and prediction techniques, which exploit spatial and temporal correlation among the sensor data, provide opportunities for reducing the energy consumption of continuous sensor...

    Provided By International Journal of Communications and Engineering