International Journal of Communications and Engineering

Displaying 81-120 of 349 results

  • White Papers // Mar 2012

    CIMDS: Adapting Postprocessing Techniques for Malware Detection

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, Trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Trust Based Authentication Technique for Security in Wimax Networks

    In WiMAX networks, security is one of the major challenges. The existing techniques address authentication to reduce the possibilities of attacking both base station and subscriber station. But in these techniques, authentication results in more delay and overhead. Also the authentication between the base station and subscriber station is not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Literature Survey on Throughput and Delay in Wireless Sensor Networks

    Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. However, other studies show that the transmission delay increases with the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    LTE Broadcast Channel Design Using System Generator

    System-level simulation has been widely used to evaluate the comprehensive performance of different mobile cellular systems up. In order to evaluate the performance of new mobile network technologies, system level simulations are crucial. WiMax 802.16m and LTE-A is 4G technology which satisfies International Mobile Telecommunication Standards of 4G. 3GPP released...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Bandwidth Allocation for Wireless System Through Periodic Scheduling Policies

    Reservation-based channel access in WLANs provides predictable and deterministic transmission and is therefore able to provide timeliness guarantees for wireless real-time applications. Reservation based channel access is energy-efficient since a wireless adaptor is powered on only during its exclusive channel access time. Keeping the bandwidth reservation of a node to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel Aware Routing With Dynamic Data Rate Control in Manets

    In wireless Mobile Ad hoc NETworks (MANETs), packet transmission is impaired by radio link fluctuations. This paper proposes a novel channel adaptive routing protocol which extends the Ad hoc On-Demand Multipath Distance Vector (AOMDV) routing protocol to accommodate channel fading. Specifically, the proposed Channel-Aware AOMDV (CA-AOMDV) uses the channel average...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Channel-Aware Multipath Routing in Mobile Ad Hoc Networks

    In MANETs, routing protocols exploit multi-hop paths to route packets. The probability of successful packet transmission on a path is dependent on the reliability of the wireless channel. The existing paper deals with multi-path routing protocol AOMDV (Ad hoc On-Demand Multi-path Distance Vector) which is an extension of AODV. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Transparent Error Correction Based Qecc for Communication Between Data Centers

    Commodity clusters running high-performance applications, connected by high-speed "Lambda" networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple applications and protocols. Maelstrom Error Correction means a rack of proxies residing between a data center and its WAN link. Maelstrom encodes FEC packets over traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Combined Scheme for Route Establishment Using Node Position, ACO and MAS

    Mobile Ad hoc NETwork (MANET) consists of nodes which communicate with other nodes using wireless transmitters in the absence of a fixed infrastructure. All nodes can serve as routers for each other and data packets are forwarded from node to node in a multi-hop fashion. The main problem in MANET...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Frequent Pattern Approach for Mining Association Rules

    An important aspect of data mining is to discover association rules among large number of item sets. Association rules are if/then statements that help uncover relationships between seemingly unrelated data in a relational database or other information repository. The main problem is the generation of candidate set. The Frequent Pattern...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Evaluation of AES Algorithm as a Peripheral in SOC

    The Advanced Encryption Standard (AES)is a symmetric block cipher operating on fixed block sizes of 128Bit and is specified for key sizes of 128, 192 and 256 Bit designed by Joan Daemen and Vincent Rijmen. The algorithm was standardized by National Institute of Standards and Technology (NIST). This component implements...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Elliptic Curve Cryptography Over Binary Field

    Elliptic Curve Digital Signature Algorithm (ECDSA) is implemented on an Altera Cyclone II EP2C20F672C6 FPGA using a DE2 development and education board. Digital signatures are digital counterparts of handwritten signatures. They provide proof of authorship and authenticity and they are unforgeriable. They also provide proof that the document has not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evolutionary Fuzzy Based System for Detecting Malicious Web Pages

    Internet became a platform for fast communication and information transactions. Web pages undergo constant dynamic transformations. Due to this reason, it has become attackers preferred pathway for installing illicit products. It also made the intruders to use World Wide Web to hack or attack a client's system. Malwares may be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constant Time Contention Mechanism for Efficient Throughput in 802.11 Mac Protocol

    In today's wireless networks, stations using the IEEE 802.11 Standard contend for the channel using the Distributed Coordination Function (DCF). Research has shown that DCF's performance degrades especially with the large number of stations. This becomes more concerning due to the increasing proliferation of wireless devices. In this paper, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Location Aided Routing in High Mobility of Adhoc Network

    The network topology in an ad hoc network is highly dynamic due to the movement of the nodes; hence mobility is a major constraint in designing routing protocols for them. Apart from mobility, the other major constraints are bandwidth and resource availability. In literature many routing protocols have been proposed...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intrusion Detection and Auto Response Using a Genetic Classifier Approach

    Intrusion is actually detecting anomalies user and other anomalies that exists in a system. In most situations, it is very difficult to realize or detect such differences before any damage occurs during break-ins. A genetic classifier -based intrusion detection system, provides active detection and automated responses during intrusions. It is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Computing Process Execution in Multicloud Environment

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Scheduling and Security Mechanism for Multi Dimensional Resource Environment

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Resources are allocated for the dependant and independent tasks. Processor and memory are shared with the nodes under heterogeneous distributed system environment. Scheduling schemes are used for the resource allocation process. Heterogeneous...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    AP Centric and Deputy Forward Method for Location Oriented Content Delivery

    In this paper, a delay-sensitive service is introduced that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of Access Points (APs) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably introduce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Network Intrusion Detection Using Enhanced Adaboost Algorithm

    Network intrusion detection is a way to separate normal behaviors from the attacked ones. An Intrusion Detection System (IDS) gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions which are attacks from outside the organization and misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Intrusion Detection Framework To Avoid SQL Injection Attacks Using WASP Tool

    SQL injection attacks pose a serious threat to the security of Web applications because they can give attackers unrestricted access to databases that contain sensitive information. In this paper, the authors propose a new, highly automated approach for protecting existing Web applications against SQL injection. Their approach has conceptual advantages...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Bandwidth Efficient ANCR Scheme for Multi-Hop Wireless MBS

    In a wireless multi-hop environment the bandwidth requirement changes continuously and rapidly in each node. And also the network consumes a lot of bandwidth during multicast broadcast services. So a bandwidth and an energy efficient scheme called ANCR is deployed using network coding. The ANCR scheme uses two heuristic schemes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Personalized Ontology Model for Web Information Gathering

    For knowledge description and user profiles representation, ontology's are used in web information gathering. When representing user profiles, many models have utilized only knowledge from either a global knowledge base or user local information. The objective of this paper is to improve web information gathering performance by using ontological user...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Database Response Policies To Support Intrusion Response System for DBMS

    The intrusion response system is responsible for issuing a suitable response to an anomalous request. The interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues are address...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dual-Band Microstrip Patch Array Antenna Design for LTE and WLAN Application

    In this paper, a dual-band microstrip patch array antenna is designed for both the MIMO 4G LTE and the WLAN systems. Design simulation and optimization processes are carried out with the aid of the Advanced Design System (ADS) electromagnetic simulator .The losses that are caused by both the substrate and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Xquery Processing in Very Large XML Databases

    XML is flexible and powerful tool that enables vital security in heterogeneous environments. The availability of large amounts of heterogeneous web data necessitates the integration of xml data from multiple xml sources. The authors need merge, or make an effort to service customers in cooperation; there is need for an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Novel Approach to Edge Detection Using Wavelet Transform and Fuzzy Rules

    Edge detection is one of the preprocessing steps in image processing and computer vision applications, particularly in the area of object segmentation. It plays a vital role in image analysis and it is a key of solving many complex problems. Despite many existing traditional edge operators, which are based on...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Multicast Routing in MANETs

    Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this paper, the authors consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. They formulate this traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    IPv6 in Visual Sensor Network

    Visual sensor network is one of the emerging technologies which will have impact on users' daily life in near future. These wireless sensor nodes are expected to vastly out number conventional computer hosts as the authors see them today, but their strict resource constraints are unlike other technologies already common...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing in Mobile Ad-hoc Cognitive Radio Networks

    Recent research activities about Cognitive Radio (CR) are mainly focusing on opportunistic spectrum access and spectrum utilization. However, CR technology will have significant impacts on upper layer performance in wireless networks, especially in Mobile Ad-hoc NETworks (MANETs). In this paper, the authors study topology control and routing issues in CR-MANETs...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving QoS for MANET By Using Energy Conserved Cluster Scheme

    Now-a-days, wireless networks are becoming more popular and it can be used in all real world applications. So it is necessary to provide a good Quality of Service (QOS) for delivering a voice, video and data. To provide different types of priority to different types of applications, QoS will provide...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Passenger Assisting System

    Advanced cell phones systems are developing to support the people to live in semi-independent and independent environments also it perform essential Activities for Daily Livings (ADLs). The approach taken is regarding context-aware and sensor enriched environments for home and medical care settings. It generally focused on the following goals, providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Test Data Compression for Equal Run Length Coding

    In this paper, test data compression based on Equal Run-Length Coding (ERLC) is presented. It is based on both types of runs of 0's and 1's and explores the relationship between two consecutive runs. This paper also presents a new technique for filling the don't care bits, which is very...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Tracking of Activities in A Smart Environment Using Fuzzy-State Qlearning Algorithm

    The machine learning and pervasive sensing technologies found in smart homes offer unprecedented opportunities for providing health monitoring and assistance to individuals experiencing difficulties living independently at home. In order to monitor the functional health of smart home residents, the authors need to design technologies that recognize and track activities...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Group Communication Using Dynamic Key Allocation Based on Tree Structure

    The goal of the paper is to evaluate trade-off between storage and revocation cost. Storage is computed in terms of keys that each user (respectively, group controller) maintains. And revocation cost is computed in terms of the encryptions performed and the number of messages transmitted, by the group controller. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reliable Wireless Communication Architecture for Sensitive Environment

    In wireless network, it is difficult to provide reliability, especially in sensitive environment where interference and intermittent delay in transmission of packets are highly risky. This paper describes an architecture which ensures reliable data and voice communication in a hospital environment. The main requirement is there should not be any...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy for Smart Grid Using Scalable Key Management

    In this paper, the authors focuses on the issues of secure key management for smart grid. With the present key management schemes, it will not yield security for deployment in smart grid. A novel key management scheme is proposed in this paper which merges elliptic curve public key technique and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Traffic Trajectory Analysis Using Router Groups with Optimal Interface Selection Scheme

    Detecting errors in traffic trajectories (i.e., packet forwarding paths) is important to operational networks. Several different traffic monitoring algorithms such as Trajectory Sampling, PSAMP and Fatih can be used for traffic trajectory error detection. However, a straight-forward application of these algorithms will incur the overhead of simultaneously monitoring all network...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralized C# Compiler Using Cloud Computing

    Cloud computing is a model for providing computation, software, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallel to this concept can be drawn with the electricity grid, wherein end-users consume power without needing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Partial Matching Mixed Mode BIST Design for Test Data Reduction

    A mixed-mode Built-In Self-Test (BIST) approach that deploys two new techniques is presented in this paper. Partial pattern matching allows the reduction of the number of patterns used for detecting random pattern resistant faults without relying on fault simulation. A multiple-control sequence is used to guide the Linear Feedback Shift...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Bots With URL Canonicalization in A Log Shipped Data Cleansing Model

    Identifying the seeds and loading the crawl frontier with Data cleansing layer in the backend is the core nature of this paper. An automatic parallel parse using text based web search querying technique on the object identifier will load the database repository with needy data. Repeatable reads on the same...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Pipelined Counter Design Based on State Look Ahead Logic for Future Implementation

    The authors present a parallel counter design that achieves high operating frequencies and consumes less power through a novel pipeline partitioning methodology (a counting path and state look-ahead path), using only three simple repeated CMOS-logic module types: an initial module generates anticipated counting states for higher significant bit modules through...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphicencryption Scheme

    k-anonymization optimization algorithm, serves as a vital privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymization is vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient only but in practice, data sources...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Congestion Control in Sensor Networks with Mobile Sink

    The imminent growth of user-centric, pervasive sensing environments promotes sink mobility in an increasing number of event-based, sensor network applications including rescue missions, intrusion detection and smart buildings. In these settings, one of the most critical challenges toward supporting Quality of Service is effective distributed congestion avoidance. Congestion control techniques...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Self Reconfigurale Wirelessmesh Networks

    A multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles and/or applications' bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive manual network management for their real-time recovery. This paper presents an Autonomous network Reconfiguration System (ARS) that enables a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    4G Wireless Communication Using Mobile WIMAX Technology

    WiMAX, meaning Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes, from point-to-point links to portable internet access. The technology provides up to 75 Mbit/s symmetric broadband speed without the need for cables. The technology is based on...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving The QoS Using Deficit Table Scheduler

    A key component for networks with Quality of Service (QoS) support is the egress link scheduling algorithm. An ideal scheduling algorithm implemented in a high-performance network with QoS support should satisfy two main properties: good end-to-end delay and implementation simplicity. Table-based schedulers try to offer a simple implementation and good...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Approach for Implementing Spatial Data in P2P Systems

    Spatial data that identifies the geographic information and boundaries on Earth, such as natural or constructed features, oceans, maps etc. P2P systems provide a distributed platform that is very scalable. Peer-To-Peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. In a computer...

    Provided By International Journal of Communications and Engineering