International Journal of Communications and Engineering

Displaying 121-160 of 349 results

  • White Papers // Mar 2012

    Multi Stage Knowledge Base for Content Based Image Retrieval with Efficient Feedback

    Multimedia images are increasing day to day. So retrieving images in large scale database is hectic. To be more profitable, relevance feedback techniques were incorporated into CBIR such that more precise results can be obtained by taking user's feedbacks into account. However, existing relevance feedback-based CBIR methods usually request a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Decentralized Data Offloading in High Performance Computing Centers Using Scratch Space

    In this paper, the authors addresses the issues associated with providing data offloading service to HPC centers. HPC centers are high performance computing centers that use parallel processing for running advanced applications more reliably and efficiently. The main concept of this paper is the offloading of data from a HPC...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Recover Link Failure Using ARTCP Mechanism

    Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, bandwidth demands causes severe performance degradation in WMNs .Link failure will lead to produce a sequence of disruptions to deliver the packets to the destination. To overcome this ART rerouting the traffic via an alternative path from a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cost Optimization in Multi Cloud Deployment for MTC Application

    Cloud computing is important acceptance in many IT Company, as they are scalable and less cost to deploy their service platforms using outsourced resources. In most past utilities where a single provider scheme is a common practice, the simultaneous access to cloud resources easily enables to use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Metaheuristic for Energy Aware Scheduling for Cloud Computing System Using Hybrid GA

    Energy is an expensive resource that is becoming more scarce with increasing population and demand. The authors' paper investigates the energy issue in task scheduling particularly on High Performance Systems (HCSs). The proposed approach analyzes the problem of scheduling precedence-constrained parallel applications on Heterogeneous Computing Systems (HCSs) like cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Application of Multimodal Biometrics Supporting A Highly Secured and Authenticated Service in Automated Teller Machine (ATM)

    A multimodal biometrics iris, fingerprint and face recognition system is a computer application for automatically identifying or verifying a person from fingerprint by using sensors or fingerprint readers or fingerprint scanners, iris recognition by Charge Coupled Device (CCD) camera and face recognition using camera. This paper uses iris, face and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy-Based Detection of DDoS Attacks Using HSM Model

    Distributed Denial of Service (DDoS) attack is a continuous threat to the Internet. It is critical to traceback the source of attacks. When the attacks with small number attack packet rates and attack strength length is less than the normal flows cannot be undetectable. The authors' approach on the detection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Identification of Users Preferences Based on Search Engine Logs

    Search engines return roughly the same results for the same query, regardless of the user's real interest. Personalized search is an important research area that aims to resolve the ambiguity of query terms. To increase the relevance of search results, personalized search engines create user profiles to capture the users'...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Content-Based Dissemination Protocol for VANET

    In Vehicular Ad-hoc NETwork (VANET), vehicles are equipped with sensing, computing and wireless devices. So that, vehicles can talks to road-side infrastructure (Vehicle To Infrastructure-V2I) and other vehicles (Vehicle To Vehicle-V2V). This communication is done by using dissemination protocol. Data about any type of event can be disseminated in the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Integrated Algorithm Scheme for Mobile Service

    Spatial data mining techniques are used to mine data values with location information. Temporal analysis is applied to perform time analysis. Location and time based analysis is applied on a variety of mobile service analysis application. Different services are provided under the mobile environment. User behavior analysis is carried out...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Time-Limited Black Box Protecting Mobile Agent Approach for Distributed Secure Intrusion Detection System Against DDoS Attacks

    In this paper, the authors present a flexible protection mechanism of intrusion detection system introducing the features of mobile agents in it. Mobile agents are prone to various security threats. In their system, they use time-limited black box approach using which the agents protect their code and data by themselves...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    MADCA with Multiple Self-Organized Sinks for Wireless Sensor Networks

    In Wireless Sensor Network, the efficient use of energy in a sensor node is an important criterion to lengthen the lifetime of the network. Existing approaches for optimal use of energy mainly revolves locating a single sink in a particular place and routing data towards it. Main objective of this...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    PAPR Reduction Based on Clipping and Scaling Approach in Multiplexing Systems Using MATLAB

    In this paper, the authors propose a simple technique for the reduction of high Peak to Average Power Ratio (PAPR), based on clipping and differential scaling, in Orthogonal Frequency Division Multiplexing (OFDM) systems. In this technique, the amplitude of complex OFDM signal is clipped and then scaled in such a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Test The Excellence of Module Set Interactions in Object Oriented Software System

    The metrics are anticipated which gauges the excellence of reformation of an Object-Oriented Software System (OOSS). The metrics can be pigeonholed the software according with the structural viewpoint (by demoting, inter module Merging-based conception). The authors take up conception of API (Application Programming Interface) as the basis for their structural...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Connectivity at Failures By ISPs with Minimum Cost

    Often users face risk of failures on many links or routers in Internet for various reasons, such as fiber cuts, failure of transmission devices, misconfiguration of routers and overloading of routers. Internet is required to be robust enough to sustain connectivity between nodes and maintain stable services in the event...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Competent Communication for Time-Critical Applications in Sunken Sensor Networks

    The main features of acoustic channels are long propagation delay and high error probability. So, it is very challenging to provide energy-efficient reliable data transfer for time critical applications such as pollution monitoring and submarine detection. In traditional retransmission upon failure, very large end-to-end delay occurs and therefore it is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Profile SVM with Distribution Management Model

    Classification techniques are used to assign category labels for the transactions. Global and local learning models are used in the classification process. Global characteristics of the data are analyzed in the global learning. Nonlinear Support Vector Machine (SVM) is a popular global learning technique. Global learning technique faces model selection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis For Threshold-Based Online Congestion-Aware Routing Algorithm

    Alternate optical network architecture, called translucent network to the fully transparent and fully opaque network architecture is investigated. In a translucent wavelength-routed optical network, a technique called sparse regeneration is used to overcome the severe light path blocking due to signal quality degradation and wavelength contention in a fully transparent...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient and Reducing Delay for Data Gathering in Wireless Sensor Networks

    In this paper, the authors consider the problem of data collection from a sensor web consisting of N nodes, where nodes have packets of data in each round of communication that need to be gathered and fused with other nodes' packets into one packet and transmitted to a distant base...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Availability of Server Selection Policy

    Fault tolerance is one of the most important issues for achieving dependable distributed systems. There is a large amount of work on failure detection in network system that failures are transient. During the crash period, the server is unable to service any request. For detecting such failures, the authors are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking Misbehaving Users in Anonymizing Networks & Broadening Nymble System

    In this paper. The authors presents Nymble, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. Their system is thus agnostic to different servers' definitions of misbehaviour servers can blacklist users for whatever reason and the privacy of blacklisted users is maintained. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Distributed Throughput Using RFID in Wireless Networks

    In a distributed system of ATM, the data and the information are not secured and can be easily accessed by some other user. So in order to avoid those drawback of existing system, the authors are using the RFID card and reader to access the user's account. One user can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Robust Traffic Management Scheme For Wireless Ad-Hoc Network

    Limited resources of nodes in MANETs force the extensive studies for energy-aware multipath routing protocols, which should provide the fault tolerance for broken links and the load balance for extending bandwidth and equalizing energy consumption. A cross layer approach is introduced for routing and MAC scheduling called RTMS (Robust Traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis Of Credit Card Fraud Detection Using Hidden Markov Model

    Due to a rapid advancement in the electronic commerce technology, the use of credit cards has dramatically increased. As credit card becomes the most popular mode of payment for both online as well as regular purchase, cases of fraud associated with it are also rising. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization Algorithms For Wireless Adhoc Networks

    It monitors personal locations with a potentially untrusted server poses privacy threats. The two algorithms, namely, resource-aware and quality-aware algorithms that aim to provide high quality location monitoring services for system users. Both algorithms established k-anonymity privacy concept to enable trusted sensor nodes to provide the aggregate location information. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Effective Load Balancing with Multipath Load Distribution Over End To End System

    Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. An effective model of delay-controlled load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ticket Based Security Architecture For Anonymizing and Tracing Misbehaving Clients in Wireless Mesh Networks

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy now-a-days. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and Peer-To-Peer (P2P) systems, little effort has been...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation Of Multipath Routing And Max-Min Fair Qos Provisioning In Distributed Systems

    Main aim of the author's paper is to send and receive packets without any problems such as hacking, congestion, traffic, overloading etc., There are many techniques were introduced to avoid these above problems; in this paper, in existing system he introduced mix networks to avoid congestion problem. The major disadvantage...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Document Clustering with Semantic Analysis Using Parallel Spectral Method

    Text documents are one of the unstructured data models that represents the information. Clustering techniques are used to group the documents based on the similarity. Parallel spectral clustering algorithm is used to cluster large data collections. Dense similarity matrix approximation is applied to reduce memory usage. Parallel spectral clustering algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing In Delay Tolerant Networks Using Minimum Distance Packet Forwarding

    Delay tolerant networks have intermittent connectivity between their nodes. There is no stable end-to-end connectivity from source to destination because the future node connections are mostly unknown. In these networks, opportunistic forwarding technique is used to deliver the message. By observing human mobility traces the conditional intermeeting time is used...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A QoS-Aware Team Multicast Routing Protocol For Mobile Ad Hoc Networks

    Team multicast identifies clusters of nodes with same affinity as teams and manages the multicast membership information using the unit of team rather than dealing with individual node members. The source propagates a data packet to each subscribed team's leader and each leader forwards the data to the entire team....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining User's Interests From Weblog Data

    Analyzing users' internet log information and extracting their interests of Web-watching behaviors are vital and challenging analysis topics of internet usage mining. Users visit their favorite sites and generally search new sites by performing keyword search on search engines. Users' Web-watching behaviors is considered a graph since visited websites and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Attack Mitigation Using Single Test Proportion

    The internet is the backbone of day to day applications. Today's responsibility for the internet service providers is to make sure that the internet service is available to the end user at all times. DDoS is a computer war against authenticated user, which makes the web server incompetent of providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Text Document Clustering in Distributed Peer Networks

    Text mining is a way to identify new, previously unknown information by applying techniques from natural language processing and data mining. But most of the techniques for text mining are based on statistical analysis for a word or phrase. If two terms have the same frequency in the documents, then...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    CIMDS: Adapting Postprocessing Techniques for Malware Detection

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, Trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Trust Based Authentication Technique for Security in Wimax Networks

    In WiMAX networks, security is one of the major challenges. The existing techniques address authentication to reduce the possibilities of attacking both base station and subscriber station. But in these techniques, authentication results in more delay and overhead. Also the authentication between the base station and subscriber station is not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Literature Survey on Throughput and Delay in Wireless Sensor Networks

    Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. However, other studies show that the transmission delay increases with the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evaluating Top-K Selection Queries Over Web-Spatial Database

    A spatial preference query ranks objects based on the scores of feature object in their spatial neighborhood. Along with the location based applications existing algorithm includes non negligible processing cost which results a high response time, because computing the score of data object needs examining its spatial neighborhood to find...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Fingerprint Matching Against Nonlinear Deformation and Cleaving Overlapped Fingerprints

    Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. Among all biometric traits, fingerprints have one of the highest levels of reliability...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization Algorithms For Wireless Adhoc Networks

    It monitors personal locations with a potentially untrusted server poses privacy threats. The two algorithms, namely, resource-aware and quality-aware algorithms that aim to provide high quality location monitoring services for system users. Both algorithms established k-anonymity privacy concept to enable trusted sensor nodes to provide the aggregate location information. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Effective Load Balancing with Multipath Load Distribution Over End To End System

    Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. An effective model of delay-controlled load distribution becomes essential to efficiently utilize such parallel paths for multimedia data transmission and real-time applications, which are commonly known...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ticket Based Security Architecture For Anonymizing and Tracing Misbehaving Clients in Wireless Mesh Networks

    Anonymity has received increasing attention in the literature due to the users' awareness of their privacy now-a-days. Anonymity provides protection for users to enjoy network services without being traced. While anonymity-related issues have been extensively studied in payment-based systems such as e-cash and Peer-To-Peer (P2P) systems, little effort has been...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation Of Multipath Routing And Max-Min Fair Qos Provisioning In Distributed Systems

    Main aim of the author's paper is to send and receive packets without any problems such as hacking, congestion, traffic, overloading etc., There are many techniques were introduced to avoid these above problems; in this paper, in existing system he introduced mix networks to avoid congestion problem. The major disadvantage...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Document Clustering with Semantic Analysis Using Parallel Spectral Method

    Text documents are one of the unstructured data models that represents the information. Clustering techniques are used to group the documents based on the similarity. Parallel spectral clustering algorithm is used to cluster large data collections. Dense similarity matrix approximation is applied to reduce memory usage. Parallel spectral clustering algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing In Delay Tolerant Networks Using Minimum Distance Packet Forwarding

    Delay tolerant networks have intermittent connectivity between their nodes. There is no stable end-to-end connectivity from source to destination because the future node connections are mostly unknown. In these networks, opportunistic forwarding technique is used to deliver the message. By observing human mobility traces the conditional intermeeting time is used...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A QoS-Aware Team Multicast Routing Protocol For Mobile Ad Hoc Networks

    Team multicast identifies clusters of nodes with same affinity as teams and manages the multicast membership information using the unit of team rather than dealing with individual node members. The source propagates a data packet to each subscribed team's leader and each leader forwards the data to the entire team....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining User's Interests From Weblog Data

    Analyzing users' internet log information and extracting their interests of Web-watching behaviors are vital and challenging analysis topics of internet usage mining. Users visit their favorite sites and generally search new sites by performing keyword search on search engines. Users' Web-watching behaviors is considered a graph since visited websites and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Attack Mitigation Using Single Test Proportion

    The internet is the backbone of day to day applications. Today's responsibility for the internet service providers is to make sure that the internet service is available to the end user at all times. DDoS is a computer war against authenticated user, which makes the web server incompetent of providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Text Document Clustering in Distributed Peer Networks

    Text mining is a way to identify new, previously unknown information by applying techniques from natural language processing and data mining. But most of the techniques for text mining are based on statistical analysis for a word or phrase. If two terms have the same frequency in the documents, then...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    CIMDS: Adapting Postprocessing Techniques for Malware Detection

    Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, Trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Trust Based Authentication Technique for Security in Wimax Networks

    In WiMAX networks, security is one of the major challenges. The existing techniques address authentication to reduce the possibilities of attacking both base station and subscriber station. But in these techniques, authentication results in more delay and overhead. Also the authentication between the base station and subscriber station is not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Defenses Against Large Scale Online Password Guessing Attacks by Using Persuasive Click Points

    Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Literature Survey on Throughput and Delay in Wireless Sensor Networks

    Most of studies only consider that wireless sensor networks are equipped with only omni-directional antennas, which can cause high collisions. It is shown that the per node throughput in such networks is decreased with the increased number of nodes. However, other studies show that the transmission delay increases with the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Evaluating Top-K Selection Queries Over Web-Spatial Database

    A spatial preference query ranks objects based on the scores of feature object in their spatial neighborhood. Along with the location based applications existing algorithm includes non negligible processing cost which results a high response time, because computing the score of data object needs examining its spatial neighborhood to find...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Fingerprint Matching Against Nonlinear Deformation and Cleaving Overlapped Fingerprints

    Biometrics is the science of verifying the identity of an individual through physiological measurements or behavioral traits. Since biometric identifiers are associated permanently with the user they are more reliable than token or knowledge based authentication methods. Among all biometric traits, fingerprints have one of the highest levels of reliability...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Integrating Novel Class Detection with Concept Drifting Data Streams

    Most existing data stream classification techniques ignore one important aspect of stream data is the arrival of a novel class. A data stream classification technique that integrates a novel class detection mechanism into classical classifiers, enabling automatic detection of novel classes before the true labels of the novel class instances...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Minimization of Storage Overhead Fortracking Down The Invasion of Replicated Nodes in Wireless Sensor Networks

    Wireless Sensor Networks are vulnerable because nodes are often placed in a hostile or dangerous environment, where they are not physically protected. A central problem in sensor network security is that sensors are susceptible to physical node capture attacks. Once a sensor is compromised, the adversary can easily launch replica...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Prioritize Spatial Object By Shortest Path Distance and By Quality Features

    Top-k spatial preference queries return a ranked set of the k best data objects based on the scores of feature objects and shortest path distance in their spatial neighborhood. Despite the wide range of location-based applications that rely on spatial preference queries, existing algorithms incur non-negligible processing cost resulting in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining Software Deficiencies Using Random Tree Algorithm

    A relevant sub area of reverse engineering is identification of modules requiring re engineering, which focuses on predicting faulty modules. To this end, predicting faulty modules may use any available source of information such as source code and documentation. Similarly, the identified abstractions may take different forms such as module...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Random Key Generation Using Multihop Networks

    The main aim of this paper propose a novel scheme to secure a multihop programming protocol through the use of multiple one-way hash chains. The scheme is shown to be lower in computational, power consumption and communication costs yet still able to secure multihop propagation of program images. A key...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Measurement of VSWR and Matched Impedence for Liquid UHF RFID Applications

    In this paper, a multiple printed dipole reader antenna is designed for Ultra High Frequency (UHF) near field Radio Frequency IDentification (RFID). The antenna is looped to produce in-phase current which makes its applicable to small size and pure near-field application requirement. It is mainly used for liquid container tagging...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Dimensional Resource Scheduling with Security for Heterogeneous Distributed Systems

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Heterogeneous systems are built to execute user applications on remote resources. Processors are shared between the users. Resources are allocated for the tasks submitted by the users. Processors and memory are shared...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Recent Survey of Intrusion Detection System in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworking (MANET) has become a key technology in recent years because of the increased usage of wireless devices and their ability to provide temporary and instant wireless networking in situations like flooding and defense. In spite of their attractive applications, MANETs poses high security problems compared to conventional...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Byte Error Correcting Code Using Cellular Automata

    Cellular Automata (CA) has already established its novelty for bits and bytes Error Correcting Codes (ECC). The current work identifies weakness and limitation of existing CA-based byte ECC and proposes an improved CA-based double byte ECC which overcomes the identified. Weakness. The code is very much suited from VLSI design...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Prediction Based Multipath Reliable Routing Protocol for MANET

    Mobile Ad-hoc NETwork (MANET) consists of wireless nodes which dynamically exchange data among themselves without fixed base station or a wired backbone network. Due to the limited transmission range of the mobile nodes, multiple hops are needed for a node to forward data to any node in the network. A...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Guidelines for Software Quality Model Using Domain-Values, User and Organizational Perception

    Software quality is a critical component in software engineering due to misunderstanding of its nature. So far there is no well-defined approach to design software quality model. Quality is always an end-point of every software engineering activity. Defining quality is not a easy task since lack understanding its definition and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Effective Automated Testing with Web Applications Using Selenium

    Web application is the most popular and fast developing field. Testing can be done to assure the correctness and completeness of the web applications. Normally manual testing can be done, but regression testing is difficult for the tester to test it manually. In order to overcome the difficulties automated testing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Fault and Tolerant Method Using Advanced Encryption Standard for Images

    An Earth Observation (EO) satellites are satellites specifically designed to observe Earth from orbit, similarly reconnanissance satellites but intended for non-millitary uses such as environmental monitoring meterology, map making etc. AES (Advanced Encryption Standard) provides the highest level of security by utilizing the newest and strongest 128 bit AES encryption...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Transparent Error Correction Based Qecc for Communication Between Data Centers

    Commodity clusters running high-performance applications, connected by high-speed "Lambda" networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple applications and protocols. Maelstrom Error Correction means a rack of proxies residing between a data center and its WAN link. Maelstrom encodes FEC packets over traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Combined Scheme for Route Establishment Using Node Position, ACO and MAS

    Mobile Ad hoc NETwork (MANET) consists of nodes which communicate with other nodes using wireless transmitters in the absence of a fixed infrastructure. All nodes can serve as routers for each other and data packets are forwarded from node to node in a multi-hop fashion. The main problem in MANET...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Frequent Pattern Approach for Mining Association Rules

    An important aspect of data mining is to discover association rules among large number of item sets. Association rules are if/then statements that help uncover relationships between seemingly unrelated data in a relational database or other information repository. The main problem is the generation of candidate set. The Frequent Pattern...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Evaluation of AES Algorithm as a Peripheral in SOC

    The Advanced Encryption Standard (AES)is a symmetric block cipher operating on fixed block sizes of 128Bit and is specified for key sizes of 128, 192 and 256 Bit designed by Joan Daemen and Vincent Rijmen. The algorithm was standardized by National Institute of Standards and Technology (NIST). This component implements...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Elliptic Curve Cryptography Over Binary Field

    Elliptic Curve Digital Signature Algorithm (ECDSA) is implemented on an Altera Cyclone II EP2C20F672C6 FPGA using a DE2 development and education board. Digital signatures are digital counterparts of handwritten signatures. They provide proof of authorship and authenticity and they are unforgeriable. They also provide proof that the document has not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improvisation of Fault Classification and Detection

    Software faults are a major threat for the dependability of software systems. When the authors intend to study the impact of software faults on software behavior, the issue of distinguishing faults categories and their frequency distribution arises immediately. For this clear detection, clear classification is needed. Very little is actually...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Retransmission Scheme for Wireless LANS

    In physical layer transmission scheme that drastically reduces the cost of retransmission by introducing network coding concepts to symbol level operation. It piggybacks a new packet on each retransmitted packet, and exploits the previously received packet (possibly with error) at the receiver to recover both the retransmitted packet and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reduced Time Approach for Interactive Postmining of Association Rules Using Ontologies

    Association rule mining is the oldest and a crucial task in data mining. In association rule mining, the latest trend is to reduce the number of association rules to a great extent. Algorithms tend to give a huge number of association rules making it intractable to the user to make...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Application of Wireless Sensor Networks for Process Control

    Currently the need of the hour is how the emerging technologies going to change the existing system. This is an important idea which has been focused by many developers and research scholars. A Wireless Sensor Network (WSN) is a wireless network consisting of different devices that use sensors to monitor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cryptanalysis on RSA Algorithm

    RSA is one of the mathematical algorithms that faced the requirements for public application that is valuable in sending information key cryptosystems. The RSA scheme is a block via insecure channels, which is counted as the cipher in which the original message and cipher worse case used in the e-commerce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Digital Filter for Multistandard Wireless Transceivers

    A digital decimation filter is designed for delta - sigma analog to digital converter. The designed filter has a multi-stage structure which is comprised of a stage CIC filter, two stage half - band filters and a stage compensation filter. Now-a-days in wireless and audio application the use of efficient...

    Provided By International Journal of Communications and Engineering