International Journal of Communications and Engineering

Displaying 161-200 of 349 results

  • White Papers // Mar 2012

    Integrating Novel Class Detection with Concept Drifting Data Streams

    Most existing data stream classification techniques ignore one important aspect of stream data is the arrival of a novel class. A data stream classification technique that integrates a novel class detection mechanism into classical classifiers, enabling automatic detection of novel classes before the true labels of the novel class instances...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Minimization of Storage Overhead Fortracking Down The Invasion of Replicated Nodes in Wireless Sensor Networks

    Wireless Sensor Networks are vulnerable because nodes are often placed in a hostile or dangerous environment, where they are not physically protected. A central problem in sensor network security is that sensors are susceptible to physical node capture attacks. Once a sensor is compromised, the adversary can easily launch replica...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Prioritize Spatial Object By Shortest Path Distance and By Quality Features

    Top-k spatial preference queries return a ranked set of the k best data objects based on the scores of feature objects and shortest path distance in their spatial neighborhood. Despite the wide range of location-based applications that rely on spatial preference queries, existing algorithms incur non-negligible processing cost resulting in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining Software Deficiencies Using Random Tree Algorithm

    A relevant sub area of reverse engineering is identification of modules requiring re engineering, which focuses on predicting faulty modules. To this end, predicting faulty modules may use any available source of information such as source code and documentation. Similarly, the identified abstractions may take different forms such as module...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Random Key Generation Using Multihop Networks

    The main aim of this paper propose a novel scheme to secure a multihop programming protocol through the use of multiple one-way hash chains. The scheme is shown to be lower in computational, power consumption and communication costs yet still able to secure multihop propagation of program images. A key...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Measurement of VSWR and Matched Impedence for Liquid UHF RFID Applications

    In this paper, a multiple printed dipole reader antenna is designed for Ultra High Frequency (UHF) near field Radio Frequency IDentification (RFID). The antenna is looped to produce in-phase current which makes its applicable to small size and pure near-field application requirement. It is mainly used for liquid container tagging...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Dimensional Resource Scheduling with Security for Heterogeneous Distributed Systems

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Heterogeneous systems are built to execute user applications on remote resources. Processors are shared between the users. Resources are allocated for the tasks submitted by the users. Processors and memory are shared...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Recent Survey of Intrusion Detection System in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworking (MANET) has become a key technology in recent years because of the increased usage of wireless devices and their ability to provide temporary and instant wireless networking in situations like flooding and defense. In spite of their attractive applications, MANETs poses high security problems compared to conventional...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Byte Error Correcting Code Using Cellular Automata

    Cellular Automata (CA) has already established its novelty for bits and bytes Error Correcting Codes (ECC). The current work identifies weakness and limitation of existing CA-based byte ECC and proposes an improved CA-based double byte ECC which overcomes the identified. Weakness. The code is very much suited from VLSI design...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Prediction Based Multipath Reliable Routing Protocol for MANET

    Mobile Ad-hoc NETwork (MANET) consists of wireless nodes which dynamically exchange data among themselves without fixed base station or a wired backbone network. Due to the limited transmission range of the mobile nodes, multiple hops are needed for a node to forward data to any node in the network. A...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Guidelines for Software Quality Model Using Domain-Values, User and Organizational Perception

    Software quality is a critical component in software engineering due to misunderstanding of its nature. So far there is no well-defined approach to design software quality model. Quality is always an end-point of every software engineering activity. Defining quality is not a easy task since lack understanding its definition and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Effective Automated Testing with Web Applications Using Selenium

    Web application is the most popular and fast developing field. Testing can be done to assure the correctness and completeness of the web applications. Normally manual testing can be done, but regression testing is difficult for the tester to test it manually. In order to overcome the difficulties automated testing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Fault and Tolerant Method Using Advanced Encryption Standard for Images

    An Earth Observation (EO) satellites are satellites specifically designed to observe Earth from orbit, similarly reconnanissance satellites but intended for non-millitary uses such as environmental monitoring meterology, map making etc. AES (Advanced Encryption Standard) provides the highest level of security by utilizing the newest and strongest 128 bit AES encryption...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Transparent Error Correction Based Qecc for Communication Between Data Centers

    Commodity clusters running high-performance applications, connected by high-speed "Lambda" networks across hundreds of milliseconds of network latency. Packet loss on long-haul networks can cripple applications and protocols. Maelstrom Error Correction means a rack of proxies residing between a data center and its WAN link. Maelstrom encodes FEC packets over traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Combined Scheme for Route Establishment Using Node Position, ACO and MAS

    Mobile Ad hoc NETwork (MANET) consists of nodes which communicate with other nodes using wireless transmitters in the absence of a fixed infrastructure. All nodes can serve as routers for each other and data packets are forwarded from node to node in a multi-hop fashion. The main problem in MANET...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Frequent Pattern Approach for Mining Association Rules

    An important aspect of data mining is to discover association rules among large number of item sets. Association rules are if/then statements that help uncover relationships between seemingly unrelated data in a relational database or other information repository. The main problem is the generation of candidate set. The Frequent Pattern...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Evaluation of AES Algorithm as a Peripheral in SOC

    The Advanced Encryption Standard (AES)is a symmetric block cipher operating on fixed block sizes of 128Bit and is specified for key sizes of 128, 192 and 256 Bit designed by Joan Daemen and Vincent Rijmen. The algorithm was standardized by National Institute of Standards and Technology (NIST). This component implements...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Elliptic Curve Cryptography Over Binary Field

    Elliptic Curve Digital Signature Algorithm (ECDSA) is implemented on an Altera Cyclone II EP2C20F672C6 FPGA using a DE2 development and education board. Digital signatures are digital counterparts of handwritten signatures. They provide proof of authorship and authenticity and they are unforgeriable. They also provide proof that the document has not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improvisation of Fault Classification and Detection

    Software faults are a major threat for the dependability of software systems. When the authors intend to study the impact of software faults on software behavior, the issue of distinguishing faults categories and their frequency distribution arises immediately. For this clear detection, clear classification is needed. Very little is actually...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Retransmission Scheme for Wireless LANS

    In physical layer transmission scheme that drastically reduces the cost of retransmission by introducing network coding concepts to symbol level operation. It piggybacks a new packet on each retransmitted packet, and exploits the previously received packet (possibly with error) at the receiver to recover both the retransmitted packet and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reduced Time Approach for Interactive Postmining of Association Rules Using Ontologies

    Association rule mining is the oldest and a crucial task in data mining. In association rule mining, the latest trend is to reduce the number of association rules to a great extent. Algorithms tend to give a huge number of association rules making it intractable to the user to make...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Application of Wireless Sensor Networks for Process Control

    Currently the need of the hour is how the emerging technologies going to change the existing system. This is an important idea which has been focused by many developers and research scholars. A Wireless Sensor Network (WSN) is a wireless network consisting of different devices that use sensors to monitor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cryptanalysis on RSA Algorithm

    RSA is one of the mathematical algorithms that faced the requirements for public application that is valuable in sending information key cryptosystems. The RSA scheme is a block via insecure channels, which is counted as the cipher in which the original message and cipher worse case used in the e-commerce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Digital Filter for Multistandard Wireless Transceivers

    A digital decimation filter is designed for delta - sigma analog to digital converter. The designed filter has a multi-stage structure which is comprised of a stage CIC filter, two stage half - band filters and a stage compensation filter. Now-a-days in wireless and audio application the use of efficient...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Applying Data Mining Techniques in Genetic Fuzzy Systems Rules To Network Intrusion Detection

    In this paper, the authors present how Data Mining discovers and extracts useful patterns from this large data to find observable patterns. The paper demonstrates the ability of Data Mining in improving the quality of decision making process in pharm industry. However, as they progress into a more integrated world...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Vehicle Theft Prevention and Location Finding System Using Face Detection Based on Image Processing

    The evident fact in the world is that the number of vehicles particularly cars and other automobiles escalating in terms of invention as well as theft attempts. Even though a lot of global and other manufacturing industry did lot of efforts to invent vehicle security system particularly for cars, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Bandwidth Efficient and Privacy-Aware Mobile Applications in Android

    Collaborative applications running on 3G devices often rely on cloud-based servers for computation and storage. A peer-to-peer approach to building these applications can provide benefits such as enhanced privacy and bandwidth efficiency. The authors propose a system which is based on asynchronous network architecture that uses the cloud to relay...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Co-Operative Spectrum Sensing Using Wavelet Transform

    In cognitive radio networks, spectrum sensing is a crucial component in the discovery of spectrum opportunities for secondary systems (or unlicensed systems). Cognitive radio is used to allow the unlicensed user to use the band of primary user. Cognitive radio is used to solve spectrum scarcity and spectrum underutilization problem....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    System Security Using Keystroke Analysis

    Security is the most important concern now-a-days. Now the authors' education system improves, by the way intruders also increase. To protect users system from them, they need to improve security. When users leave the system alive without log off, at the time some intruders enter their system and may misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Bit Stream Compression Using Golomb Coding In FPGA

    Field-Programmable Gate Array (FPGA) is widely used in reconfigurable systems. Since the configuration information for FPGA has to be stored in internal or external memory as bit streams, the limited memory size and access bandwidth become the key factors in determining the different functionalities that a system can be configured...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting Fault Localization By Giving Different Test Cases For The Code

    Localizing the fault is complex while executing the program. The authors proposed a technique code coverage, statement coverage based fault localization. In this, programmers identify and repair faulty code more effectively and efficiently. In this paper, they also report on experiments performed on the "Siemen Test Suite". By the code...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Range and Location Based Privacy Aware Monitoring For Dynamic Objects

    Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a Privacy-Aware Monitoring (PAM) framework that addresses both issues. The framework distinguishes itself from the existing work by being the first to holistically address the issues of location updating in terms of monitoring accuracy, efficiency and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ranking and Optimising Web Services in Semantic Dimension Using PSO Algorithm

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To address QoS-aware semantic web...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Wi-Fi Tehnology and its Trends in IT

    There are many trends in users IT industry. Here the authors are going to discuss about the emerging technology in IT (i.e.) Wi-Fi technology. Wi-Fi (Wireless Fidelity) is a way to connect to the internet without any wires or cumbersome cables. Wi-Fi technology uses a radio technology called 802.11b for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Framework For Accountability and Trust in Cloud Computing

    Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. In this paper, the authors ensure the trust in cloud computing by enabling Public...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Feature Reduction Technique For Large Scale Text Data

    The text data dimension reduction plays an important role in the present day mining of text data and information retrieval. Dimensionality reduction algorithms are generally designed for feature extraction or feature selection. The authors' paper feature-selection algorithm can achieve the optimal solution according to its objective function. In this paper,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Business Model For Cloud Computing with Caching Notion

    In this paper, the authors propose a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext and the party responsible for data encryption and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Security and Performance Outsourcing Over Cloud Computing Using Linear Programming

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adhoc Network Security Using Dynamic IP Configuration

    In MANETs, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In the authors' paper, they present an ID based dynamic IP configuration scheme that can securely allocate IP addresses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Third Party Auditing For Dynamic Data

    In cloud storage system, the client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. Existing protocols support both features with the help...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Applying Data Mining Techniques in Genetic Fuzzy Systems Rules To Network Intrusion Detection

    In this paper, the authors present how Data Mining discovers and extracts useful patterns from this large data to find observable patterns. The paper demonstrates the ability of Data Mining in improving the quality of decision making process in pharm industry. However, as they progress into a more integrated world...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Vehicle Theft Prevention and Location Finding System Using Face Detection Based on Image Processing

    The evident fact in the world is that the number of vehicles particularly cars and other automobiles escalating in terms of invention as well as theft attempts. Even though a lot of global and other manufacturing industry did lot of efforts to invent vehicle security system particularly for cars, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Bandwidth Efficient and Privacy-Aware Mobile Applications in Android

    Collaborative applications running on 3G devices often rely on cloud-based servers for computation and storage. A peer-to-peer approach to building these applications can provide benefits such as enhanced privacy and bandwidth efficiency. The authors propose a system which is based on asynchronous network architecture that uses the cloud to relay...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Co-Operative Spectrum Sensing Using Wavelet Transform

    In cognitive radio networks, spectrum sensing is a crucial component in the discovery of spectrum opportunities for secondary systems (or unlicensed systems). Cognitive radio is used to allow the unlicensed user to use the band of primary user. Cognitive radio is used to solve spectrum scarcity and spectrum underutilization problem....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    System Security Using Keystroke Analysis

    Security is the most important concern now-a-days. Now the authors' education system improves, by the way intruders also increase. To protect users system from them, they need to improve security. When users leave the system alive without log off, at the time some intruders enter their system and may misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Bit Stream Compression Using Golomb Coding In FPGA

    Field-Programmable Gate Array (FPGA) is widely used in reconfigurable systems. Since the configuration information for FPGA has to be stored in internal or external memory as bit streams, the limited memory size and access bandwidth become the key factors in determining the different functionalities that a system can be configured...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting Fault Localization By Giving Different Test Cases For The Code

    Localizing the fault is complex while executing the program. The authors proposed a technique code coverage, statement coverage based fault localization. In this, programmers identify and repair faulty code more effectively and efficiently. In this paper, they also report on experiments performed on the "Siemen Test Suite". By the code...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Range and Location Based Privacy Aware Monitoring For Dynamic Objects

    Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a Privacy-Aware Monitoring (PAM) framework that addresses both issues. The framework distinguishes itself from the existing work by being the first to holistically address the issues of location updating in terms of monitoring accuracy, efficiency and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ranking and Optimising Web Services in Semantic Dimension Using PSO Algorithm

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To address QoS-aware semantic web...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Wi-Fi Tehnology and its Trends in IT

    There are many trends in users IT industry. Here the authors are going to discuss about the emerging technology in IT (i.e.) Wi-Fi technology. Wi-Fi (Wireless Fidelity) is a way to connect to the internet without any wires or cumbersome cables. Wi-Fi technology uses a radio technology called 802.11b for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Framework For Accountability and Trust in Cloud Computing

    Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. In this paper, the authors ensure the trust in cloud computing by enabling Public...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Feature Reduction Technique For Large Scale Text Data

    The text data dimension reduction plays an important role in the present day mining of text data and information retrieval. Dimensionality reduction algorithms are generally designed for feature extraction or feature selection. The authors' paper feature-selection algorithm can achieve the optimal solution according to its objective function. In this paper,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Business Model For Cloud Computing with Caching Notion

    In this paper, the authors propose a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext and the party responsible for data encryption and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Security and Performance Outsourcing Over Cloud Computing Using Linear Programming

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adhoc Network Security Using Dynamic IP Configuration

    In MANETs, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In the authors' paper, they present an ID based dynamic IP configuration scheme that can securely allocate IP addresses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Third Party Auditing For Dynamic Data

    In cloud storage system, the client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. Existing protocols support both features with the help...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preservation Against Traffic Analysis Using Random Network Coding in Multi-Hop Wireless Networks

    In multi-hop wireless networks, privacy threat is one of the critical issues, where attacks such as traffic analysis can be easily launched by a malicious adversary due to the open-air transmission. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ontology Based Semantic Annotation Framework

    In this paper, the authors present a semantic annotation framework that is capable of extracting appropriate information from unstructured, ungrammatical and unintelligible data sources. The framework, named BNOSA, uses ontology to conceptualize a problem domain and to extract data from the given corpora and Bayesian networks to resolve conflicts and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy Based IP Traceback Against DDOS Attacks

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory-less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Dimensional Data Anonymous Publication and Updates to Confidential Databases

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Red Protocol for the Detection of Clone Attacks

    One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Powerful Pattern Matching Algorithm for Embedded Network Security

    Network security applications generally require the ability to perform powerful pattern matching to protect against attacks such as viruses and spam. Traditional hard-ware solutions are intended for firewall routers. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Safe Cloud Storage With Multiple Cloud Servers

    Cloud computing was formerly intended for dealing with difficulties relating huge volumes of data and/or compute-intensive applications. Today, however, Clouds enlarged their skyline as they are going to run both scientific and business applications supporting scientists, professionals and end users. Thus, clouds promise to be for scientists an alternative to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Distance Based Energy Aware Routing in Wireless Sensor Networks

    Wireless sensor Network function with many routing protocols from the LEACH to high power short distance routing protocol. Still there are some unresolved issues in routing protocol in wireless sensor networks. In this paper the proposed algorithm is distance based energy aware routing named as DER. The distance based energy...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VLSI Based High-Throughput Multistandard Convolutional Turbo Scalable Map Processor Design

    Most of advanced wireless standards, such as WiMAX and LTE, have adopted different Convolutional Turbo Code (CTC) schemes with various block sizes and throughput rates. Thus, a reconfigurable and scalable hardware accelerator for multi standard CTC decoding is necessary. In this paper, the authors propose scalable Maximum A Posteriori algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Frequent Patterns Based on Incremental Mining Model for Uncertain Databases

    A database is viewed as a set of deterministic instances. Possible world refers the finite number of tuples with finite attributes. Uncertain database contains an exponential number of possible worlds. Rule mining algorithms are used to extract frequent item sets. The candidate sets and item sets are extracted from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Privacy in Location-Based Services

    The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Operational Load Balancing System for P2P Architecture With Range Query Processing

    Distributed computing is being used in several fields to solve many computation intensive problems. There has been recent interest in developing Peer-To-Peer (P2P) networks that can support ad-hoc queries over key ranges. A solution is to use range partitioning of data across the peer nodes. If the data and query...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Access Security and Holistic Hybrid Approach to Solve the Anomalies

    Radio Frequency IDentification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many anomalies. In the practical situations, particularly where a number of readers and other wireless devices share the same frequency band, the performance on the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Location Constrained Data Transmission Mechanism for MANET

    Mobile ad hoc networks are temporary networks. No fixed infrastructure is used for MANET. The base stations, towers, routers and retransmission switches are not used in the mobile ad-hoc networks. The mobile nodes act as the routers. All the data transmission is carried out through the intermediate nodes. MANETs are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Novel Detection Method for Anonymous Network Attacks Tomitigate and Traceback Ddos

    DOS attacks represent a growing threat to the internet infrastructure, by denying regular internet services from being accessed by legitimate users. IP traceback is the process of identifying the actual source(s) of attack packets, So that the attackers can be held accountable as Considering the spherical/Ellipsoidal topology of the earth,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Multistep Nearest Neighbour Search in Data Mining

    Multistep processing is commonly used for Nearest Neighbor (NN) and similarity search in applications involving high-dimensional data and costly distance computations. Today, many such applications require a proof of result correctness. In this setting, clients issue NN queries to a server that maintains a database signed by a trusted authority....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Node Replica Detection in Wireless Sensor Networks

    Wireless sensor nodes lack hardware support for tamper resistance and are often deployed in unattended environments, thus leaving them vulnerable to capture and compromise by an adversary. In a node replication attack, an adversary can easily capture even a single node and inserts duplicated nodes at any location in the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Defensive Technique for Prefix Hijacking Attack Based on Route Reliability for BGP

    In internet, prefix hijacking is the type of network attack that can give malicious parties access to untraceable IP addresses. To defend against Prefix Hijacking Attack which is a category of path validation in Border Gateway Protocol (BGP), the authors propose to design a defensive technique which consists of route...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reducing Network Block Rate Using Wavelength Heuristics in Optical WDM Networks

    In survivable optical WDM networks, wavelength assignment is a major concern than assigning routes to the light paths. Earlier wavelength assignment algorithm suffers from unbalanced utilization of wavelength that leads to blocking probability for any connection request. In this paper, the authors analyze various wavelength heuristics and how to minimize...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of AES Using Intra-Round Pipelining Technique

    Advanced Encryption Standard has received significant interest over the past decade due to its performance and security level. Many hardware implementations have been proposed. In most of the previous papers, sub-bytes and inverse sub-bytes are implemented using lookup table method. In this paper, the authors used combinational logic which helps...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Data Throughput Prediction and Optimization Service for Widely Distributedmany-Task Computing

    A data throughput prediction and optimization service for many-task computing in widely distributed environments. This service uses multiple parallel TCP streams to improve the end-to-end throughput of data transfers. A novel mathematical model is developed to determine the number of parallel streams, required to achieve the best network performance. This...

    Provided By International Journal of Communications and Engineering