International Journal of Communications and Engineering

Displaying 81-120 of 349 results

  • White Papers // Mar 2012

    Improving Security and Performance in the TOR Network Through Opportunistic Bandwidth Measurement Mechanism

    Tor, a circuit-based low-latency anonymous communication service, is a protocol that is both more secure and performs better, both in terms of observed performance and in terms of achievable anonymity and provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. This paper proposes improvements to the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reliability and Securing Topology Maintenance Protocols for Sensor Network

    The authors analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known Topology Maintenance Protocols (TMPs) for sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an active or awake state. The design of these protocols assumes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Internal Coupled-FED Antenna for GSM/UMTS/LTE Operation for Tablet Computer

    Antennas for mobile handsets is generally required to have such characteristics as compactness, complete built-in mountability, multiband operation and environment isolation as well as broadband bandwidth and high efficiency. A coupled-fed shorted monopole with its feed structure as an effective radiator for eight-band LTE/WWAN operation in the laptop computer is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Ontology Based E-Learning for Cloud Environment

    E-Learning is the use of technology to enable people to learn anytime and anywhere. E-Learning can include training, the delivery of just-in-time information and guidance from experts. E-learning is popular among the people because of its flexibility in learning and in the time convention of individual learning. Hence, this paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multivariant Execution Environment Against Code Injectionattacks

    As the number and complexity of attacks on computer systems are increasing, this growth necessitates proper defense mechanisms. Intrusion detection systems play an important role in detecting and disrupting attacks before they can compromise software. Multivariant execution is an intrusion detection mechanism that executes several slightly different versions, called variants,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Load Distribution Over Multipath Networks to Control the Delay

    An effective model of delay-controlled Load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known to be sensitive to packet delay, packet delay variation, and packet reordering. Recent research on load distribution has focused on load balancing efficiency, bandwidth...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Cross-Layer Based Improved TCP Protocol for Multi Hop Wireless Ad Hoc Networks

    The congestion handling is the biggest single issue that makes the traditional Transmission Control Protocol (TCP) a poor choice for ad hoc wireless networks. In wireless ad hoc networks, if the packet loss occurs frequently for any reason, the size of TCP congestion window will stay at very low level...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adaptive Rate Control Cryptographic Active Voice Transcoding (ARC-CAVT) Congestion Control Mechanism for Voice Over IP (VOIP) Transmission - A Case Study

    The quality of bulky real time voice communication over an IP network degrades due to packet header overhead, network congestion and improper queuing strategies. These overheads affect the overall IP network performance and QoS parameters of voice communication such as packet loss, packet delay and packet latency or jitter. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Query Performance Using Semantic Overlay Creation

    In a Peer-To-Peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding tends to be very expensive. In this paper it is proposed that node connections be influenced by content, so that for example, nodes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Countermeasure Against Parasitic Adversaries in Wireless Sensor Network

    Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, the authors first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a counter-measure, they first...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Digital PID Feedback Controller for a Buck Converter

    The design of a digital controller is presented for a dc-dc converter. Digital control of dc-dc converter using DSP is becoming more and more common in industry today. Starting with a dc-dc buck converter and a given set of performance specifications, a digital PID controller is designed and implemented in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Layer Conflict Detecting by Improve the Routing Performance

    Cross layer conflicts occur due to mismatch or misalignment of routing objectives. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load. In the authors' work, they build on past...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Protocol for Remote Data Possession Checking in Cloud

    Cloud storage enables users to remotely store their data without the burden of local hardware and software management. Once data goes into the cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. While previously proposed protocols fail to provide strong security assurance...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy in Mobile Social Networking

    Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of Smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    License Authentication Security System Using RFID

    This paper describes the theft of two wheeler vehicles probably causes less anxiety to the public than household burglary, it is a crime which occurs one and half times more frequently than other thefts. This report examines, for a technical readership, the security weaknesses of existing vehicle designs and considers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Web Mining Using Page Rank Algorithm Based Genetic Relation Algorithm

    Data mining is a new method in retrieving the knowledge from the large database. Data mining nowadays plays an important role in searching the information on the web that includes a high variety of data types. For reaching this goal, data mining techniques has been used as web mining. As...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralised Approach for Service Composition in Wireless Sensor Networks

    Wireless sensor network is a highly distributed network with small wireless nodes that are deployed in large numbers to monitor the environment by measurements of physical parameters. Wireless sensor networks have limited bandwidth, processing power and energy. Each node in the wireless sensor network may provide multiple services that when...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Jamming Detection and Mitigation Using Code Tree in Wireless Broadcast Networking

    Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric-operations: a user that possesses the key to decode a transmission can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Characteristic Based Modelling Approach for Social Networking Management Using Objectmodelling Technology

    Social networking systems are of modern day interest to the fast growing IT Sector. The paper proposes a set of diagrams based on object orientation principle which describes hardware and software functionalities. The diagrams depicts the functional, behavioral and structural aspects of the embedded electronics system. The proposed modeling methodology...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

    k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Critical Event Monitoring in Wsnusing Sleep Scheduling

    This paper explores a novel sleep scheduling method to reduce the delay of alarm broadcasting from any sensor node in WSNs. When a critical event occurs, an alarm message should be broadcast to the entire network. Specifically, there are two determined traffic paths for the transmission of alarm message, and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Sensor Network Queries With Contest Free Transmission

    In wireless sensor networks the performance of query services is increased due to the emergence of high data rate sensor network applications. To meet this challenge, a Dynamic Conflict free Query Scheduling (DCQS), this is a novel scheduling technique for queries in wireless sensor networks. DCQS is specifically designed for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Automated Personal Identification Using Fusion of Iris

    Biometrics are measurable in physiological and or behavioral characteristics and can be used to verify the identity of the individual. Proposed work based on personal identification approaches using iris images. Approaches related to both canny edge detection and parabolic Hough transform to detect the iris boundaries in the eye's digital...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Socionet Using Cluster Based Intelligent Search Algorithm

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources. They can be roughly classified as either structured or unstructured networks. Without stringent constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Reduction Using Adaptive Clustering In Sensor Networks

    In many applications of Wireless Sensor Networks (WSNs), it is necessary to continuously extract data from the networks. It is expensive to obtain all sensor readings. Clustering and prediction techniques, which exploit spatial and temporal correlation among the sensor data, provide opportunities for reducing the energy consumption of continuous sensor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    K-Means Clustering with Careful Seeding For Large Cluster Number

    Clustering is the unsupervised classification of patterns into groups so that the objects in the same cluster are more similar. There are many clustering algorithms based on cluster model such as connectivity based hierarchical algorithm, centroid based k-means algorithm, distribution based expectation-maximization algorithm and density based algorithm. Among these, K-means...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evolutionary Fuzzy Based System for Detecting Malicious Web Pages

    Internet became a platform for fast communication and information transactions. Web pages undergo constant dynamic transformations. Due to this reason, it has become attackers preferred pathway for installing illicit products. It also made the intruders to use World Wide Web to hack or attack a client's system. Malwares may be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constant Time Contention Mechanism for Efficient Throughput in 802.11 Mac Protocol

    In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Location Aided Routing in High Mobility of Adhoc Network

    The network topology in an ad hoc network is highly dynamic due to the movement of the nodes; hence mobility is a major constraint in designing routing protocols for them. Apart from mobility, the other major constraints are bandwidth and resource availability. In literature many routing protocols have been proposed...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intrusion Detection and Auto Response Using a Genetic Classifier Approach

    Intrusion is actually detecting anomalies user and other anomalies that exists in a system. In most situations, it is very difficult to realize or detect such differences before any damage occurs during break-ins. A genetic classifier -based intrusion detection system, provides active detection and automated responses during intrusions. It is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    LTE Broadcast Channel Design Using System Generator

    System-level simulation has been widely used to evaluate the comprehensive performance of different mobile cellular systems up. In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. WiMax 802.16m and LTE-A is 4G technology which satisfies International Mobile Telecommunication Standards of 4G. 3GPP released...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Bandwidth Allocation for Wireless System Through Periodic Scheduling Policies

    Reservation-based channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless real-time applications. Reservation based channel access is energy-efficient since a wireless adaptor is powered on only during its exclusive channel access time. Keeping the bandwidth reservation of a node to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel Aware Routing With Dynamic Data Rate Control in Manets

    In wireless Mobile Ad hoc NETworks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol to accommodate channel fading. Specifically, the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel average...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel-Aware Multipath Routing in Mobile Ad Hoc Networks

    In MANETs, routing protocols exploit multi-hop paths to route packets. The probability of successful packet transmission on a path is dependent on the reliability of the wireless channel. The existing paper deals with multi-path routing protocol AOMDV (Ad hoc On-Demand Multi-path Distance Vector) which is an extension of AODV. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detection of Vulnerability Network Traffic and Relica Node Attak in Wireless Sensor Network

    In Wireless Sensor Networks, an adversary can capture and compromise sensor nodes, make replicas of them and then mount variety of attacks with these replicas. These replica nodes are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of network....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Missing Value Estimation for Mixed Attribute Data Sets Using Higher Order Kernels

    Missing data imputation is a key issue in learning from incomplete data. Various techniques have been developed with great successes on dealing with missing values in data sets with homogeneous attributes (their independent attributes are all either continuous or discrete). The existing system provides a new setting for missing data...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Novel Online Intrusion Detection System Based on Alert Aggregation with Data Stream and Generative Modeling

    Intrusion Detection System is a device which provides protective measures for the public and private networks. It guarantees information security. At present scenario, most IDS are quite reliable in detecting suspicious intrusion attacks, but when the intrusion actions caused by a single attack instance of particular type, often results in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Classification of Queries Using C4.5 Algorithm in Micro Blogging Supported Classroom

    Micro-blogging is a popular technology in social networking applications that lets users publish online short text messages (e.g., less than 200 characters) in real time via the web, SMS, instant messaging clients, etc. Micro-blogging can be an effective tool in the classroom and has lately gained notable interest from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel State Estimation Algorithm Based on Data Rate for MAC Protocol in 802.11 Multi Hop Ad Hoc Networks

    Medium Access Control (MAC) protocol plays an important role in providing fair and efficient allocation of limited bandwidth in Wireless LANs. In IEEE 802.11 standard protocol, data rate selection is not specified. Rate control is the process of switching data rates dynamically based on channel conditions, with the target of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Processing Top-K Queries Using Indexing Structure

    Given a record set D and a query score function F, a top-k query returns k records from D, whose values of function F on their attributes are the highest .The intrinsic connection between top-k queries and dominant relationships between records, based on which, an efficient layer-based indexing structure, Pareto-based...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    K-Means Clustering with Careful Seeding For Large Cluster Number

    Clustering is the unsupervised classification of patterns into groups so that the objects in the same cluster are more similar. There are many clustering algorithms based on cluster model such as connectivity based hierarchical algorithm, centroid based k-means algorithm, distribution based expectation-maximization algorithm and density based algorithm. Among these, K-means...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evolutionary Fuzzy Based System for Detecting Malicious Web Pages

    Internet became a platform for fast communication and information transactions. Web pages undergo constant dynamic transformations. Due to this reason, it has become attackers preferred pathway for installing illicit products. It also made the intruders to use World Wide Web to hack or attack a client's system. Malwares may be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constant Time Contention Mechanism for Efficient Throughput in 802.11 Mac Protocol

    In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Location Aided Routing in High Mobility of Adhoc Network

    The network topology in an ad hoc network is highly dynamic due to the movement of the nodes; hence mobility is a major constraint in designing routing protocols for them. Apart from mobility, the other major constraints are bandwidth and resource availability. In literature many routing protocols have been proposed...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intrusion Detection and Auto Response Using a Genetic Classifier Approach

    Intrusion is actually detecting anomalies user and other anomalies that exists in a system. In most situations, it is very difficult to realize or detect such differences before any damage occurs during break-ins. A genetic classifier -based intrusion detection system, provides active detection and automated responses during intrusions. It is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    LTE Broadcast Channel Design Using System Generator

    System-level simulation has been widely used to evaluate the comprehensive performance of different mobile cellular systems up. In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. WiMax 802.16m and LTE-A is 4G technology which satisfies International Mobile Telecommunication Standards of 4G. 3GPP released...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Bandwidth Allocation for Wireless System Through Periodic Scheduling Policies

    Reservation-based channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless real-time applications. Reservation based channel access is energy-efficient since a wireless adaptor is powered on only during its exclusive channel access time. Keeping the bandwidth reservation of a node to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel Aware Routing With Dynamic Data Rate Control in Manets

    In wireless Mobile Ad hoc NETworks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol to accommodate channel fading. Specifically, the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel average...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel-Aware Multipath Routing in Mobile Ad Hoc Networks

    In MANETs, routing protocols exploit multi-hop paths to route packets. The probability of successful packet transmission on a path is dependent on the reliability of the wireless channel. The existing paper deals with multi-path routing protocol AOMDV (Ad hoc On-Demand Multi-path Distance Vector) which is an extension of AODV. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detection of Vulnerability Network Traffic and Relica Node Attak in Wireless Sensor Network

    In Wireless Sensor Networks, an adversary can capture and compromise sensor nodes, make replicas of them and then mount variety of attacks with these replicas. These replica nodes are dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of network....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Missing Value Estimation for Mixed Attribute Data Sets Using Higher Order Kernels

    Missing data imputation is a key issue in learning from incomplete data. Various techniques have been developed with great successes on dealing with missing values in data sets with homogeneous attributes (their independent attributes are all either continuous or discrete). The existing system provides a new setting for missing data...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Novel Online Intrusion Detection System Based on Alert Aggregation with Data Stream and Generative Modeling

    Intrusion Detection System is a device which provides protective measures for the public and private networks. It guarantees information security. At present scenario, most IDS are quite reliable in detecting suspicious intrusion attacks, but when the intrusion actions caused by a single attack instance of particular type, often results in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Classification of Queries Using C4.5 Algorithm in Micro Blogging Supported Classroom

    Micro-blogging is a popular technology in social networking applications that lets users publish online short text messages (e.g., less than 200 characters) in real time via the web, SMS, instant messaging clients, etc. Micro-blogging can be an effective tool in the classroom and has lately gained notable interest from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel State Estimation Algorithm Based on Data Rate for MAC Protocol in 802.11 Multi Hop Ad Hoc Networks

    Medium Access Control (MAC) protocol plays an important role in providing fair and efficient allocation of limited bandwidth in Wireless LANs. In IEEE 802.11 standard protocol, data rate selection is not specified. Rate control is the process of switching data rates dynamically based on channel conditions, with the target of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Processing Top-K Queries Using Indexing Structure

    Given a record set D and a query score function F, a top-k query returns k records from D, whose values of function F on their attributes are the highest .The intrinsic connection between top-k queries and dominant relationships between records, based on which, an efficient layer-based indexing structure, Pareto-based...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Stage Knowledge Base for Content Based Image Retrieval with Efficient Feedback

    Multimedia images are increasing day to day. So retrieving images in large scale database is hectic. To be more profitable, relevance feedback techniques were incorporated into CBIR such that more precise results can be obtained by taking user's feedbacks into account. However, existing relevance feedback-based CBIR methods usually request a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Decentralized Data Offloading in High Performance Computing Centers Using Scratch Space

    In this paper, the authors addresses the issues associated with providing data offloading service to HPC centers. HPC centers are high performance computing centers that use parallel processing for running advanced applications more reliably and efficiently. The main concept of this paper is the offloading of data from a HPC...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Recover Link Failure Using ARTCP Mechanism

    Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, bandwidth demands causes severe performance degradation in WMNs .Link failure will lead to produce a sequence of disruptions to deliver the packets to the destination. To overcome this ART rerouting the traffic via an alternative path from a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cost Optimization in Multi Cloud Deployment for MTC Application

    Cloud computing is important acceptance in many IT Company, as they are scalable and less cost to deploy their service platforms using outsourced resources. In most past utilities where a single provider scheme is a common practice, the simultaneous access to cloud resources easily enables to use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Metaheuristic for Energy Aware Scheduling for Cloud Computing System Using Hybrid GA

    Energy is an expensive resource that is becoming more scarce with increasing population and demand. The authors' paper investigates the energy issue in task scheduling particularly on High Performance Systems (HCSs). The proposed approach analyzes the problem of scheduling precedence-constrained parallel applications on Heterogeneous Computing Systems (HCSs) like cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Application of Multimodal Biometrics Supporting A Highly Secured and Authenticated Service in Automated Teller Machine (ATM)

    A multimodal biometrics iris, fingerprint and face recognition system is a computer application for automatically identifying or verifying a person from fingerprint by using sensors or fingerprint readers or fingerprint scanners, iris recognition by Charge Coupled Device (CCD) camera and face recognition using camera. This paper uses iris, face and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy-Based Detection of DDoS Attacks Using HSM Model

    Distributed Denial of Service (DDoS) attack is a continuous threat to the Internet. It is critical to traceback the source of attacks. When the attacks with small number attack packet rates and attack strength length is less than the normal flows cannot be undetectable. The authors' approach on the detection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Identification of Users Preferences Based on Search Engine Logs

    Search engines return roughly the same results for the same query, regardless of the user's real interest. Personalized search is an important research area that aims to resolve the ambiguity of query terms. To increase the relevance of search results, personalized search engines create user profiles to capture the users'...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Content-Based Dissemination Protocol for VANET

    In Vehicular Ad-hoc NETwork (VANET), vehicles are equipped with sensing, computing and wireless devices. So that, vehicles can talks to road-side infrastructure (Vehicle To Infrastructure-V2I) and other vehicles (Vehicle To Vehicle-V2V). This communication is done by using dissemination protocol. Data about any type of event can be disseminated in the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Integrated Algorithm Scheme for Mobile Service

    Spatial data mining techniques are used to mine data values with location information. Temporal analysis is applied to perform time analysis. Location and time based analysis is applied on a variety of mobile service analysis application. Different services are provided under the mobile environment. User behavior analysis is carried out...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Time-Limited Black Box Protecting Mobile Agent Approach for Distributed Secure Intrusion Detection System Against DDoS Attacks

    In this paper, the authors present a flexible protection mechanism of intrusion detection system introducing the features of mobile agents in it. Mobile agents are prone to various security threats. In their system, they use time-limited black box approach using which the agents protect their code and data by themselves...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    MADCA with Multiple Self-Organized Sinks for Wireless Sensor Networks

    In Wireless Sensor Network, the efficient use of energy in a sensor node is an important criterion to lengthen the lifetime of the network. Existing approaches for optimal use of energy mainly revolves locating a single sink in a particular place and routing data towards it. Main objective of this...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    PAPR Reduction Based on Clipping and Scaling Approach in Multiplexing Systems Using MATLAB

    In this paper, the authors propose a simple technique for the reduction of high Peak to Average Power Ratio (PAPR), based on clipping and differential scaling, in Orthogonal Frequency Division Multiplexing (OFDM) systems. In this technique, the amplitude of complex OFDM signal is clipped and then scaled in such a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Test The Excellence of Module Set Interactions in Object Oriented Software System

    The metrics are anticipated which gauges the excellence of reformation of an Object-Oriented Software System (OOSS). The metrics can be pigeonholed the software according with the structural viewpoint (by demoting, inter module Merging-based conception). The authors take up conception of API (Application Programming Interface) as the basis for their structural...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Connectivity at Failures By ISPs with Minimum Cost

    Often users face risk of failures on many links or routers in Internet for various reasons, such as fiber cuts, failure of transmission devices, misconfiguration of routers and overloading of routers. Internet is required to be robust enough to sustain connectivity between nodes and maintain stable services in the event...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Competent Communication for Time-Critical Applications in Sunken Sensor Networks

    The main features of acoustic channels are long propagation delay and high error probability. So, it is very challenging to provide energy-efficient reliable data transfer for time critical applications such as pollution monitoring and submarine detection. In traditional retransmission upon failure, very large end-to-end delay occurs and therefore it is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Profile SVM with Distribution Management Model

    Classification techniques are used to assign category labels for the transactions. Global and local learning models are used in the classification process. Global characteristics of the data are analyzed in the global learning. Nonlinear Support Vector Machine (SVM) is a popular global learning technique. Global learning technique faces model selection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis For Threshold-Based Online Congestion-Aware Routing Algorithm

    Alternate optical network architecture, called translucent network to the fully transparent and fully opaque network architecture is investigated. In a translucent wavelength-routed optical network, a technique called sparse regeneration is used to overcome the severe light path blocking due to signal quality degradation and wavelength contention in a fully transparent...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient and Reducing Delay for Data Gathering in Wireless Sensor Networks

    In this paper, the authors consider the problem of data collection from a sensor web consisting of N nodes, where nodes have packets of data in each round of communication that need to be gathered and fused with other nodes' packets into one packet and transmitted to a distant base...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Availability of Server Selection Policy

    Fault tolerance is one of the most important issues for achieving dependable distributed systems. There is a large amount of work on failure detection in network system that failures are transient. During the crash period, the server is unable to service any request. For detecting such failures, the authors are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking Misbehaving Users in Anonymizing Networks & Broadening Nymble System

    In this paper. The authors presents Nymble, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. Their system is thus agnostic to different servers' definitions of misbehaviour servers can blacklist users for whatever reason and the privacy of blacklisted users is maintained. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Distributed Throughput Using RFID in Wireless Networks

    In a distributed system of ATM, the data and the information are not secured and can be easily accessed by some other user. So in order to avoid those drawback of existing system, the authors are using the RFID card and reader to access the user's account. One user can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Robust Traffic Management Scheme For Wireless Ad-Hoc Network

    Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath routing protocols, which should provide the fault tolerance for broken links and the load balance for extending bandwidth and equalizing energy consumption. A cross layer approach is introduced for routing and MAC scheduling called RTMS (Robust Traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis Of Credit Card Fraud Detection Using Hidden Markov Model

    Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, the authors...

    Provided By International Journal of Communications and Engineering