International Journal of Communications and Engineering

Displaying 81-120 of 349 results

  • White Papers // Mar 2012

    Mining User's Interests From Weblog Data

    Analyzing users' internet log information and extracting their interests of Web-watching behaviors are vital and challenging analysis topics of internet usage mining. Users visit their favorite sites and generally search new sites by performing keyword search on search engines. Users' Web-watching behaviors is considered a graph since visited websites and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reducing Network Block Rate Using Wavelength Heuristics in Optical WDM Networks

    In survivable optical WDM networks, wavelength assignment is a major concern than assigning routes to the light paths. Earlier wavelength assignment algorithm suffers from unbalanced utilization of wavelength that leads to blocking probability for any connection request. In this paper, the authors analyze various wavelength heuristics and how to minimize...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of AES Using Intra-Round Pipelining Technique

    Advanced Encryption Standard has received significant interest over the past decade due to its performance and security level. Many hardware implementations have been proposed. In most of the previous papers, sub-bytes and inverse sub-bytes are implemented using lookup table method. In this paper, the authors used combinational logic which helps...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Digital Filter for Multistandard Wireless Transceivers

    A digital decimation filter is designed for delta - sigma analog to digital converter. The designed filter has a multi-stage structure which is comprised of a stage CIC filter, two stage half - band filters and a stage compensation filter. Now-a-days in wireless and audio application the use of efficient...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Applying Data Mining Techniques in Genetic Fuzzy Systems Rules To Network Intrusion Detection

    In this paper, the authors present how Data Mining discovers and extracts useful patterns from this large data to find observable patterns. The paper demonstrates the ability of Data Mining in improving the quality of decision making process in pharm industry. However, as they progress into a more integrated world...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Vehicle Theft Prevention and Location Finding System Using Face Detection Based on Image Processing

    The evident fact in the world is that the number of vehicles particularly cars and other automobiles escalating in terms of invention as well as theft attempts. Even though a lot of global and other manufacturing industry did lot of efforts to invent vehicle security system particularly for cars, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Bandwidth Efficient and Privacy-Aware Mobile Applications in Android

    Collaborative applications running on 3G devices often rely on cloud-based servers for computation and storage. A peer-to-peer approach to building these applications can provide benefits such as enhanced privacy and bandwidth efficiency. The authors propose a system which is based on asynchronous network architecture that uses the cloud to relay...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Co-Operative Spectrum Sensing Using Wavelet Transform

    In cognitive radio networks, spectrum sensing is a crucial component in the discovery of spectrum opportunities for secondary systems (or unlicensed systems). Cognitive radio is used to allow the unlicensed user to use the band of primary user. Cognitive radio is used to solve spectrum scarcity and spectrum underutilization problem....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    System Security Using Keystroke Analysis

    Security is the most important concern now-a-days. Now the authors' education system improves, by the way intruders also increase. To protect users system from them, they need to improve security. When users leave the system alive without log off, at the time some intruders enter their system and may misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Bit Stream Compression Using Golomb Coding In FPGA

    Field-Programmable Gate Array (FPGA) is widely used in reconfigurable systems. Since the configuration information for FPGA has to be stored in internal or external memory as bit streams, the limited memory size and access bandwidth become the key factors in determining the different functionalities that a system can be configured...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting Fault Localization By Giving Different Test Cases For The Code

    Localizing the fault is complex while executing the program. The authors proposed a technique code coverage, statement coverage based fault localization. In this, programmers identify and repair faulty code more effectively and efficiently. In this paper, they also report on experiments performed on the "Siemen Test Suite". By the code...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Range and Location Based Privacy Aware Monitoring For Dynamic Objects

    Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a Privacy-Aware Monitoring (PAM) framework that addresses both issues. The framework distinguishes itself from the existing work by being the first to holistically address the issues of location updating in terms of monitoring accuracy, efficiency and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ranking and Optimising Web Services in Semantic Dimension Using PSO Algorithm

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To address QoS-aware semantic web...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Competent Communication for Time-Critical Applications in Sunken Sensor Networks

    The main features of acoustic channels are long propagation delay and high error probability. So, it is very challenging to provide energy-efficient reliable data transfer for time critical applications such as pollution monitoring and submarine detection. In traditional retransmission upon failure, very large end-to-end delay occurs and therefore it is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Profile SVM with Distribution Management Model

    Classification techniques are used to assign category labels for the transactions. Global and local learning models are used in the classification process. Global characteristics of the data are analyzed in the global learning. Nonlinear Support Vector Machine (SVM) is a popular global learning technique. Global learning technique faces model selection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis For Threshold-Based Online Congestion-Aware Routing Algorithm

    Alternate optical network architecture, called translucent network to the fully transparent and fully opaque network architecture is investigated. In a translucent wavelength-routed optical network, a technique called sparse regeneration is used to overcome the severe light path blocking due to signal quality degradation and wavelength contention in a fully transparent...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient and Reducing Delay for Data Gathering in Wireless Sensor Networks

    In this paper, the authors consider the problem of data collection from a sensor web consisting of N nodes, where nodes have packets of data in each round of communication that need to be gathered and fused with other nodes' packets into one packet and transmitted to a distant base...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Availability of Server Selection Policy

    Fault tolerance is one of the most important issues for achieving dependable distributed systems. There is a large amount of work on failure detection in network system that failures are transient. During the crash period, the server is unable to service any request. For detecting such failures, the authors are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking Misbehaving Users in Anonymizing Networks & Broadening Nymble System

    In this paper. The authors presents Nymble, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. Their system is thus agnostic to different servers' definitions of misbehaviour servers can blacklist users for whatever reason and the privacy of blacklisted users is maintained. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Distributed Throughput Using RFID in Wireless Networks

    In a distributed system of ATM, the data and the information are not secured and can be easily accessed by some other user. So in order to avoid those drawback of existing system, the authors are using the RFID card and reader to access the user's account. One user can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Robust Traffic Management Scheme For Wireless Ad-Hoc Network

    Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath routing protocols, which should provide the fault tolerance for broken links and the load balance for extending bandwidth and equalizing energy consumption. A cross layer approach is introduced for routing and MAC scheduling called RTMS (Robust Traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis Of Credit Card Fraud Detection Using Hidden Markov Model

    Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Wi-Fi Tehnology and its Trends in IT

    There are many trends in users IT industry. Here the authors are going to discuss about the emerging technology in IT (i.e.) Wi-Fi technology. Wi-Fi (Wireless Fidelity) is a way to connect to the internet without any wires or cumbersome cables. Wi-Fi technology uses a radio technology called 802.11b for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Framework For Accountability and Trust in Cloud Computing

    Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. In this paper, the authors ensure the trust in cloud computing by enabling Public...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Feature Reduction Technique For Large Scale Text Data

    The text data dimension reduction plays an important role in the present day mining of text data and information retrieval. Dimensionality reduction algorithms are generally designed for feature extraction or feature selection. The authors' paper feature-selection algorithm can achieve the optimal solution according to its objective function. In this paper,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Business Model For Cloud Computing with Caching Notion

    In this paper, the authors propose a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext and the party responsible for data encryption and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Security and Performance Outsourcing Over Cloud Computing Using Linear Programming

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adhoc Network Security Using Dynamic IP Configuration

    In MANETs, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In the authors' paper, they present an ID based dynamic IP configuration scheme that can securely allocate IP addresses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Third Party Auditing For Dynamic Data

    In cloud storage system, the client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. Existing protocols support both features with the help...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preservation Against Traffic Analysis Using Random Network Coding in Multi-Hop Wireless Networks

    In multi-hop wireless networks, privacy threat is one of the critical issues, where attacks such as traffic analysis can be easily launched by a malicious adversary due to the open-air transmission. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ontology Based Semantic Annotation Framework

    In this paper, the authors present a semantic annotation framework that is capable of extracting appropriate information from unstructured, ungrammatical and unintelligible data sources. The framework, named BNOSA, uses ontology to conceptualize a problem domain and to extract data from the given corpora and Bayesian networks to resolve conflicts and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy Based IP Traceback Against DDOS Attacks

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory-less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Connectivity at Failures By ISPs with Minimum Cost

    Often users face risk of failures on many links or routers in Internet for various reasons, such as fiber cuts, failure of transmission devices, misconfiguration of routers and overloading of routers. Internet is required to be robust enough to sustain connectivity between nodes and maintain stable services in the event...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reliable Wireless Communication Architecture for Sensitive Environment

    In wireless network, it is difficult to provide reliability, especially in sensitive environment where interference and intermittent delay in transmission of packets are highly risky. This paper describes an architecture which ensures reliable data and voice communication in a hospital environment. The main requirement is there should not be any...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Emergency Message Dissemination in Two Dimensional Space Using Percolation Phenomenon

    Vehicular Ad-hoc NETworks (VANETs) are an important part of Intelligent Transport System (ITS) which is used to avoid traffic congestion, improve traffic efficiency and to prevent accidents for enhancing road safety. In this paper, a modified Time and Location Critical (M-TLC) framework for dissemination of emergency messages is proposed. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Persistent Communication Using Ednr Protocol in Manet

    The main motivation of this paper is to provide Quality of Service (QoS) guarantees in mobile ad hoc networks. In mobile ad hoc networks, a host may lose its energy or roam independently without informing to its cooperative nodes, causing changes in network topology, and thus, these changes cause overwhelming...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Acknowledgement Based Scheme to Defend Against Cooperative Black Hole Attacks in DSR Routing Protocol

    Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. The authors propose a routing-aware multiple description video coding approach to support video transmission over mobile ad-hoc networks with multiple path transport. They build a statistical model to estimate the packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Preventive Mechanism for Blocking Attact of Maobile Agents in Secured Layer Architecture

    In distributed computing, mobile agent plays a major role as it is utilizing the resources available on the connected network and its capability of operation on different environments. When an agent migrates from one node to another node to fulfill the task of its owner, the agent route is decided...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Extended Security for Intrusion Detection System Using Data Cleaning in Large Database

    A suitable response to an atypical request is issued by the intrusion detection system. The concept of database response policies to support the intrusion response system adapted for a database management system is proposed. Depending on the nature of the anomalous request, the database administrators provide the response actions for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Digital Video Broadcasting-T2: Multiple Input Multiple Output Configuration

    This paper explores the possibility of implementing multiple antennas at the transmission side with multiple receiving antennas which is technically called as Multiple Input Multiple Output (MIMO) configuration. Digital Video Broadcasting Terrestrial Second generation (DVB-T2) is chosen as a potential digital signal broadcasting technology for the above. Orthogonal Frequency Division...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Object Based Video Retrieval

    Every year video content is growing in volume and there are different techniques available to capture, compress, display, store and transmit video while editing and manipulating video based on their content is still a non-trivial activity. Recent advances in multimedia technologies allow the capture and storage of video data with...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Enhanced DCQS in Wireless Sensor Networks

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Protocol Optimization for Clock Synchronization in Wireless Sensor Networks

    Recent development in technologies has led to the development of a large number of cost effective sensors for various applications. However it is essential to make these sensors combined together for efficient monitoring of systems. Event detection is made possible by collecting information received from various sensor nodes. Hence it...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Energy and Coverage Optimization in Dynamic Wireless Sensor Networks for Life Time Maximization

    Wireless Sensor Network usually have special life time requirements. However the density of the sensors may not be large enough to satisfy the coverage requirement while meeting the life time constraint at the same time. All the coverage is traded for network life time. In the past work maximize only...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Region Based Query Processing in Wireless Sensor Networks

    In Wireless Sensor Networks, nodes are subject to failure because of their non rechargeable batteries. When reading from individual node is encountered, it may yield noisy data. The effect of this can be reduced by making use of aggregated values of small group of sensors instead of the values of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimization of Resource Sharing in Structured Peer-To-Peer Networks

    Utilizing the skewed popularity distribution in P2P systems, common in Gnutella and KazaA like P2P applications, the authors propose an optimal resource (replica or link) placement strategy, which can optimally tradeoff the performance gain and paid cost. The proposed resource placement strategy, with better results than existing works, can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Optimization During Intrusion Detection in Wireless Sensor Networks

    In this modern era, Wireless Sensor Networks (WSN) is a booming technology that is used everywhere. Wireless Sensor Network consists of numerous sensor nodes deployed to monitor environmental conditions such as forest fire detection, military field, landslide monitoring, etc. The intrusion during wireless transmission is the most important challenge faced...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Low-Complexity PAPR Reduction Scheme for Interleaved and Sub-Band OFDMA Uplink Systems

    Both PAPR and computational complexity are critical challenges in OFDMA systems, especially for the mobile terminals. SLM schemes are commonly employed to reduce the PAPR in OFDM systems, but it requires many IFFT operations. In this paper, to decrease the number of IFFT operations and PAPR two methods are proposed....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Transparent Error Correction Based Qecc for Communication Between Data Centers

    Commodity clusters running high-performance applications, connected by high-speed "Lambda" networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple applications and protocols. Maelstrom Error Correction means a rack of proxies residing between a data center and its WAN link. Maelstrom encodes FEC packets over traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Combined Scheme for Route Establishment Using Node Position, ACO and MAS

    Mobile Ad hoc NETwork (MANET) consists of nodes which communicate with other nodes using wireless transmitters in the absence of a fixed infrastructure. All nodes can serve as routers for each other and data packets are forwarded from node to node in a multi-hop fashion. The main problem in MANET...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Frequent Pattern Approach for Mining Association Rules

    An important aspect of data mining is to discover association rules among large number of item sets. Association rules are if/then statements that help uncover relationships between seemingly unrelated data in a relational database or other information repository. The main problem is the generation of candidate set. The Frequent Pattern...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Evaluation of AES Algorithm as a Peripheral in SOC

    The Advanced Encryption Standard (AES)is a symmetric block cipher operating on fixed block sizes of 128Bit and is specified for key sizes of 128, 192 and 256 Bit designed by Joan Daemen and Vincent Rijmen. The algorithm was standardized by National Institute of Standards and Technology (NIST). This component implements...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Elliptic Curve Cryptography Over Binary Field

    Elliptic Curve Digital Signature Algorithm (ECDSA) is implemented on an Altera Cyclone II EP2C20F672C6 FPGA using a DE2 development and education board. Digital signatures are digital counterparts of handwritten signatures. They provide proof of authorship and authenticity and they are unforgeriable. They also provide proof that the document has not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Attack Mitigation Using Single Test Proportion

    The internet is the backbone of day to day applications. Today's responsibility for the internet service providers is to make sure that the internet service is available to the end user at all times. DDoS is a computer war against authenticated user, which makes the web server incompetent of providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Reduction Using Adaptive Clustering In Sensor Networks

    In many applications of Wireless Sensor Networks (WSNs), it is necessary to continuously extract data from the networks. It is expensive to obtain all sensor readings. Clustering and prediction techniques, which exploit spatial and temporal correlation among the sensor data, provide opportunities for reducing the energy consumption of continuous sensor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    K-Means Clustering with Careful Seeding For Large Cluster Number

    Clustering is the unsupervised classification of patterns into groups so that the objects in the same cluster are more similar. There are many clustering algorithms based on cluster model such as connectivity based hierarchical algorithm, centroid based k-means algorithm, distribution based expectation-maximization algorithm and density based algorithm. Among these, K-means...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improvisation of Fault Classification and Detection

    Software faults are a major threat for the dependability of software systems. When the authors intend to study the impact of software faults on software behavior, the issue of distinguishing faults categories and their frequency distribution arises immediately. For this clear detection, clear classification is needed. Very little is actually...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Retransmission Scheme for Wireless LANS

    In physical layer transmission scheme that drastically reduces the cost of retransmission by introducing network coding concepts to symbol level operation. It piggybacks a new packet on each retransmitted packet, and exploits the previously received packet (possibly with error) at the receiver to recover both the retransmitted packet and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reduced Time Approach for Interactive Postmining of Association Rules Using Ontologies

    Association rule mining is the oldest and a crucial task in data mining. In association rule mining, the latest trend is to reduce the number of association rules to a great extent. Algorithms tend to give a huge number of association rules making it intractable to the user to make...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Application of Wireless Sensor Networks for Process Control

    Currently the need of the hour is how the emerging technologies going to change the existing system. This is an important idea which has been focused by many developers and research scholars. A Wireless Sensor Network (WSN) is a wireless network consisting of different devices that use sensors to monitor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cryptanalysis on RSA Algorithm

    RSA is one of the mathematical algorithms that faced the requirements for public application that is valuable in sending information key cryptosystems. The RSA scheme is a block via insecure channels, which is counted as the cipher in which the original message and cipher worse case used in the e-commerce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Text Document Clustering in Distributed Peer Networks

    Text mining is a way to identify new, previously unknown information by applying techniques from natural language processing and data mining. But most of the techniques for text mining are based on statistical analysis for a word or phrase. If two terms have the same frequency in the documents, then...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    CIMDS: Adapting Postprocessing Techniques for Malware Detection

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, Trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Trust Based Authentication Technique for Security in Wimax Networks

    In WiMAX networks, security is one of the major challenges. The existing techniques address authentication to reduce the possibilities of attacking both base station and subscriber station. But in these techniques, authentication results in more delay and overhead. Also the authentication between the base station and subscriber station is not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Literature Survey on Throughput and Delay in Wireless Sensor Networks

    Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. However, other studies show that the transmission delay increases with the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evolutionary Fuzzy Based System for Detecting Malicious Web Pages

    Internet became a platform for fast communication and information transactions. Web pages undergo constant dynamic transformations. Due to this reason, it has become attackers preferred pathway for installing illicit products. It also made the intruders to use World Wide Web to hack or attack a client's system. Malwares may be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constant Time Contention Mechanism for Efficient Throughput in 802.11 Mac Protocol

    In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Location Aided Routing in High Mobility of Adhoc Network

    The network topology in an ad hoc network is highly dynamic due to the movement of the nodes; hence mobility is a major constraint in designing routing protocols for them. Apart from mobility, the other major constraints are bandwidth and resource availability. In literature many routing protocols have been proposed...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intrusion Detection and Auto Response Using a Genetic Classifier Approach

    Intrusion is actually detecting anomalies user and other anomalies that exists in a system. In most situations, it is very difficult to realize or detect such differences before any damage occurs during break-ins. A genetic classifier -based intrusion detection system, provides active detection and automated responses during intrusions. It is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    LTE Broadcast Channel Design Using System Generator

    System-level simulation has been widely used to evaluate the comprehensive performance of different mobile cellular systems up. In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. WiMax 802.16m and LTE-A is 4G technology which satisfies International Mobile Telecommunication Standards of 4G. 3GPP released...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Bandwidth Allocation for Wireless System Through Periodic Scheduling Policies

    Reservation-based channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless real-time applications. Reservation based channel access is energy-efficient since a wireless adaptor is powered on only during its exclusive channel access time. Keeping the bandwidth reservation of a node to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel Aware Routing With Dynamic Data Rate Control in Manets

    In wireless Mobile Ad hoc NETworks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol to accommodate channel fading. Specifically, the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel average...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel-Aware Multipath Routing in Mobile Ad Hoc Networks

    In MANETs, routing protocols exploit multi-hop paths to route packets. The probability of successful packet transmission on a path is dependent on the reliability of the wireless channel. The existing paper deals with multi-path routing protocol AOMDV (Ad hoc On-Demand Multi-path Distance Vector) which is an extension of AODV. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering