International Journal of Communications and Engineering

Displaying 161-200 of 349 results

  • White Papers // Mar 2012

    Efficient Energy and Coverage Optimization in Dynamic Wireless Sensor Networks for Life Time Maximization

    Wireless Sensor Network usually have special life time requirements. However the density of the sensors may not be large enough to satisfy the coverage requirement while meeting the life time constraint at the same time. All the coverage is traded for network life time. In the past work maximize only...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Region Based Query Processing in Wireless Sensor Networks

    In Wireless Sensor Networks, nodes are subject to failure because of their non rechargeable batteries. When reading from individual node is encountered, it may yield noisy data. The effect of this can be reduced by making use of aggregated values of small group of sensors instead of the values of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimization of Resource Sharing in Structured Peer-To-Peer Networks

    Utilizing the skewed popularity distribution in P2P systems, common in Gnutella and KazaA like P2P applications, the authors propose an optimal resource (replica or link) placement strategy, which can optimally tradeoff the performance gain and paid cost. The proposed resource placement strategy, with better results than existing works, can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Congestion Control in Sensor Networks with Mobile Sink

    The imminent growth of user-centric, pervasive sensing environments promotes sink mobility in an increasing number of event-based, sensor network applications including rescue missions, intrusion detection and smart buildings. In these settings, one of the most critical challenges toward supporting Quality of Service is effective distributed congestion avoidance. Congestion control techniques...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Self Reconfigurale Wirelessmesh Networks

    A multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles and/or applications' bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive manual network management for their real-time recovery. This paper presents an Autonomous network Reconfiguration System (ARS) that enables a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    4G Wireless Communication Using Mobile WIMAX Technology

    WiMAX, meaning Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes, from point-to-point links to portable internet access. The technology provides up to 75 Mbit/s symmetric broadband speed without the need for cables. The technology is based on...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving The QoS Using Deficit Table Scheduler

    A key component for networks with Quality of Service (QoS) support is the egress link scheduling algorithm. An ideal scheduling algorithm implemented in a high-performance network with QoS support should satisfy two main properties: good end-to-end delay and implementation simplicity. Table-based schedulers try to offer a simple implementation and good...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Approach for Implementing Spatial Data in P2P Systems

    Spatial data that identifies the geographic information and boundaries on Earth, such as natural or constructed features, oceans, maps etc. P2P systems provide a distributed platform that is very scalable. Peer-To-Peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. In a computer...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient On-Demand Sleep Wake Protocol in Wireless Sensor Networks

    Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with sleep-wake protocols to ensure both long lived operation and a high degree of security. The authors' contribution in this paper is to address this...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Indoor Environment Monitoring System Based on Embedded System

    Indoor Environment Monitoring System (IEMS) for monitoring the concentrations of indoor air pollutant gases and environmental parameters. The sensor array is implemented using the electrochemical sensors. Interface is implemented using the PIC18F4550 microcontroller, it has less power consumption. Network Capable Application Processor (NCAP) implemented in labview9.0 is based on the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving The Detection of Mobile Replica Nodes Attacks Using Epsilon-Perfect Nash Equilibrium

    The attacker may be able to capture and compromise the mobile nodes, and then use them to inject fake data, disrupt the network operations and eavesdrop on network communications. Detection of replica nodes attacks in infinite duration. And the authors' goal is to detect the fact that both compromised and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Managing Space-Time Heterogeneity for Parallel Structured Adaptive Applications

    Structured Adaptive Mesh Refinement (SAMR) techniques provide an effective means for dynamically concentrating computational effort and resources to appropriate regions in the application domain. However, due to their dynamism and space-time heterogeneity, scalable parallel implementation of SAMR applications remains a challenge. This paper investigates hybrid runtime management strategies and presents...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining Patterns for XML Query Answering Using TAR's

    To extract the information from semistructured documents is a very hard task and is going to become more and more critical as the amount of digital information available on the internet grows. Indeed, documents are often so large that the dataset returned as answer to a query may be too...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Small State and Stretch Efficient Routing for Wireless Networks

    Routing protocols for large wireless networks must address the challenges of reliable packet delivery at increasingly large scales and with highly limited resources. Attempts to reduce routing state can result in undesirable worst-case routing performance, as measured by stretch, which is the ratio of the hop count of the selected...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Optimization During Intrusion Detection in Wireless Sensor Networks

    In this modern era, Wireless Sensor Networks (WSN) is a booming technology that is used everywhere. Wireless Sensor Network consists of numerous sensor nodes deployed to monitor environmental conditions such as forest fire detection, military field, landslide monitoring, etc. The intrusion during wireless transmission is the most important challenge faced...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Low-Complexity PAPR Reduction Scheme for Interleaved and Sub-Band OFDMA Uplink Systems

    Both PAPR and computational complexity are critical challenges in OFDMA systems, especially for the mobile terminals. SLM schemes are commonly employed to reduce the PAPR in OFDM systems, but it requires many IFFT operations. In this paper, to decrease the number of IFFT operations and PAPR two methods are proposed....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Home Surveillance System Based on MCU and GSM

    Home embedded surveillance system are designed with group of sensors and Micro Controller Unit (MCU). This design consists of two group of sensors, outdoor and indoor. Pyroelectric InfraRed sensors (PIR) and pressure sensors as the alert group in windows and doors where an intruder must pass through. These outdoor sensors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Increasing The Life Time of Hetrogenous WSN Through ACO-MNCC

    Increasing the life time of heterogeneous Wireless Sensor Network (WSN) and minimizing the run time of the ACO-MNCC by using implicit parallelism. The computational time is very important for these searching algorithms. In this methodology, finding the maximum number of disjoints connected covers that satisfy both sensing coverage and network...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Security for The Credit Card Users Using Machine Learning Technique

    The authors' paper deals with the security for the credit card users in online purchasing. Now-a-days, the credit card usage might be increasing in online and at the same time, the fraudulent activities also increasing. The activity is the hackers trace the credit card numbers through fake websites and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Threat Modelling Using an Attack Surface Metric

    Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure software development. Hence, the need for metrics is more pressing now due to a growing demand for secure software. In this paper, the authors propose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Bandwidth Adaptation Supported Adaptive Call Admission Control Mechanism for 3GPP: LTE Networks

    In this continuous fast world of mobile devices there is always a growing demand of high rate services. So a call has to be continuous with same data rates during a handoff. This paper deals with a novel approach to reduce the call dropping probability while ensuring QoS demands are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Genetic Algorithm for Optimization of Bloom Filter in Spam Filtering

    Spam is an unsolicited e-mail on the web sent to an outsized range of users. A spam filter is employed to detect the spam mails and to prevent those mails from user's inbox. Bloom filter is used for identifying the spam mails. A Bloom filter is a memory efficient data...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Biometric Authentication Using Fingerprints: A Review

    Biometrics is the science of establishing the identity of an individual based on the physical, chemical or behavioral attributes of the person. The features of fingerprint which can uniquely represent a fingerprint is used for fingerprint recognition. Automatic fingerprint recognition technology has now rapidly grown beyond forensic application and civilian...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A View on Natural Language Processing and Text Summarization

    Text summarization plays an important role in the area of natural language processing and text mining. Text summarization aims to create a compressed summary while retaining the main characteristics of the original set of documents. Many approaches use statistics and machine learning techniques to extract sentences from documents. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Filtering Points Based Skyline Query Processing in Distributed Data Sites

    The skyline query used in a large number of unstructured distributed databases located at different data sites, it extracts the data from, where relevant data are distributed among geographically scattered sites. Constrained skyline query is attached with constraints on specific dimensions. A constraint on a dimension is a range specifying...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Tree Zone Orieted Logic Using Geographic Protocol Over MANET

    In mobile ad Hoc network, group communications are different form. Multicast is a fundamental service for supporting information exchanges and collaborative task execution among a group of users. There are several multicast routing protocols in MANET have been shown to large overhead due to high networks dynamic topology. A number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Static Ram Cell Design for Low Power Consumption

    A low power Static-Random Access Memory (SRAM) has become a critical component in modern VLSI systems. In cells, the bit-lines are the most power consuming components because of larger power dissipation in driving long bit-line with large capacitance. The cache write consumes considerable large power due to full voltage swing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Error Tolerant Booth Multiplier for Lossy Applications

    Multipliers are the fundamental arithmetic unit in multimedia and digital signal processing applications. The fixed width multipliers are used in those applications where the authors have to maintain a fixed format and allow a little accuracy loss of output data. In this paper, they have proposed a low power technique...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Periodicity Stream-Mining Using Continuous Database

    Periodic stream mining or periodicity detection has a number of applications, such as prediction, forecasting, detection of unusual activities, etc. The data to be analyzed might be noisy (or) perfect data set for which periodicity is to be investigated. There is a need for a comprehensive approach capable of analyzing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Route Diversity in Tree Based Distributed Hash Tables

    Hash tables - which map "Keys" onto "Values" - are an essential building block in modern software systems. Nodes can deny access to keys or misroute lookups. In this paper address both of these problems through replica placement. Replica placement that creates route diversity for these DHTs. Using simulations of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Security Mechanism for Misbehaving Users in Wireless Mesh Network

    As a combination of ad hoc networks and Wireless Local Area Network (WLAN), the Wireless Mesh Network (WMN) provides a low-cost convenient solution to last-mile network connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are no longer applicable in WMNs....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ascendable Datacenter Servers Using Ficonn Bi-Port Structure

    This paper explores a new server-interconnection structure. The commodity server machines used in today's data centers usually come with two built-in Ethernet ports, one for network connection and the other left for backup purposes. Believe that if both ports are actively used in network connections, it can build a scalable,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Segmentation and Denoising of Surveillance Video Using Adaptive Gmm Towards Effective Video Retrieval

    In modern times, the advanced technologies in camera have made the video acquisition more feasible. Data sets collected by image sensors are generally contaminated by noise. Imperfect instruments, problems with the data acquisition process, and interfering natural phenomena can all degrade the data of interest. Surveillance sequences do not only...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Grouping Servicefor Senior Citizens

    SOA is a computing paradigm for generating distributed and heterogeneous software systems. Services are basic elements for generating application in SOA. Service is a platform independent, reusable and loosely coupled software component that is described, registered and discovered. The most obvious capability of SOA is assembling of several services to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    EFDCB Algorithm Based QoS Routing in MANET

    A set of attributes related to the performance of the connection for each communication user can request a particular attribute each service is associated with a set of attributes. To find a feasible path between source and destination this satisfies the QoS requirements. The problem of routing based on a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Advanced RF/Baseband Interconnect Schemes for Inter- and Intra-ULSI Communications

    Future inter- and intra-ULSI interconnect systems demand extremely high data rates (up to 100 Gbps/pin or 20-Tbps aggregate) as well as bidirectional multi-I/O concurrent service, reconfigurable computing/processing architecture and total compatibility with mainstream silicon system-on-chip and system-in-package technologies. In this paper, the authors review recent advances in interconnect schemes that...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Circulated Client-Assisted Control Mission Optimization for Ungainly WLAN

    IEEE 802.11 WLANs are becoming more and more popular in homes and urban areas. As compared to traditional WLAN setups (such as in campuses) where knowledgeable network administrators can make centralized decisions on channel selection, Access Points (APs) in these networks are often deployed by network non-specialists in an uncoordinated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Processing and Analysis of Satellite Images To Detect Vegetation

    Satellite images have many applications like meterology, agriculture, geology, forestry, landscape warfare etc. Interpretation and analysis of satellite imagery is conducted using specialized remote sensing applications. In this paper, the authors have developed a technique which tries to extract useful information from large set of satellite images. They consider time...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Machine Learning Strategy for Throughput Improvement in Grid Computing

    Resource allocation and job scheduling are the core functions of grid computing. These functions are based on adequate information of available resources. Grid resource monitoring and grid resource prediction are the two mechanisms used. Grid resource state monitoring cares about the running state, distribution, load and malfunction of resources in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Throughput Optimization Using Parallelism and Packet Loss Recovery in WAN

    Using multiple parallel streams for wide area data transfers may yield much better performance than using a single stream, but overwhelming the network by opening too many streams may have an inverse effect. The congestion created by excess number of streams may cause a drop down in the throughput achieved....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Attack Mitigation Using Single Test Proportion

    The internet is the backbone of day to day applications. Today's responsibility for the internet service providers is to make sure that the internet service is available to the end user at all times. DDoS is a computer war against authenticated user, which makes the web server incompetent of providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Reduction Using Adaptive Clustering In Sensor Networks

    In many applications of Wireless Sensor Networks (WSNs), it is necessary to continuously extract data from the networks. It is expensive to obtain all sensor readings. Clustering and prediction techniques, which exploit spatial and temporal correlation among the sensor data, provide opportunities for reducing the energy consumption of continuous sensor...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    K-Means Clustering with Careful Seeding For Large Cluster Number

    Clustering is the unsupervised classification of patterns into groups so that the objects in the same cluster are more similar. There are many clustering algorithms based on cluster model such as connectivity based hierarchical algorithm, centroid based k-means algorithm, distribution based expectation-maximization algorithm and density based algorithm. Among these, K-means...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Operational Load Balancing System for P2P Architecture With Range Query Processing

    Distributed computing is being used in several fields to solve many computation intensive problems. There has been recent interest in developing Peer-To-Peer (P2P) networks that can support ad-hoc queries over key ranges. A solution is to use range partitioning of data across the peer nodes. If the data and query...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Access Security and Holistic Hybrid Approach to Solve the Anomalies

    Radio Frequency IDentification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many anomalies. In the practical situations, particularly where a number of readers and other wireless devices share the same frequency band, the performance on the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Location Constrained Data Transmission Mechanism for MANET

    Mobile ad hoc networks are temporary networks. No fixed infrastructure is used for MANET. The base stations, towers, routers and retransmission switches are not used in the mobile ad-hoc networks. The mobile nodes act as the routers. All the data transmission is carried out through the intermediate nodes. MANETs are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Novel Detection Method for Anonymous Network Attacks Tomitigate and Traceback Ddos

    DOS attacks represent a growing threat to the internet infrastructure, by denying regular internet services from being accessed by legitimate users. IP traceback is the process of identifying the actual source(s) of attack packets, So that the attackers can be held accountable as Considering the spherical/Ellipsoidal topology of the earth,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Multistep Nearest Neighbour Search in Data Mining

    Multistep processing is commonly used for Nearest Neighbor (NN) and similarity search in applications involving high-dimensional data and costly distance computations. Today, many such applications require a proof of result correctness. In this setting, clients issue NN queries to a server that maintains a database signed by a trusted authority....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Bit Stream Compression Using Golomb Coding In FPGA

    Field-Programmable Gate Array (FPGA) is widely used in reconfigurable systems. Since the configuration information for FPGA has to be stored in internal or external memory as bit streams, the limited memory size and access bandwidth become the key factors in determining the different functionalities that a system can be configured...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting Fault Localization By Giving Different Test Cases For The Code

    Localizing the fault is complex while executing the program. The authors proposed a technique code coverage, statement coverage based fault localization. In this, programmers identify and repair faulty code more effectively and efficiently. In this paper, they also report on experiments performed on the "Siemen Test Suite". By the code...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Range and Location Based Privacy Aware Monitoring For Dynamic Objects

    Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a Privacy-Aware Monitoring (PAM) framework that addresses both issues. The framework distinguishes itself from the existing work by being the first to holistically address the issues of location updating in terms of monitoring accuracy, efficiency and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ranking and Optimising Web Services in Semantic Dimension Using PSO Algorithm

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To address QoS-aware semantic web...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Wi-Fi Tehnology and its Trends in IT

    There are many trends in users IT industry. Here the authors are going to discuss about the emerging technology in IT (i.e.) Wi-Fi technology. Wi-Fi (Wireless Fidelity) is a way to connect to the internet without any wires or cumbersome cables. Wi-Fi technology uses a radio technology called 802.11b for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Framework For Accountability and Trust in Cloud Computing

    Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. In this paper, the authors ensure the trust in cloud computing by enabling Public...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Feature Reduction Technique For Large Scale Text Data

    The text data dimension reduction plays an important role in the present day mining of text data and information retrieval. Dimensionality reduction algorithms are generally designed for feature extraction or feature selection. The authors' paper feature-selection algorithm can achieve the optimal solution according to its objective function. In this paper,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Business Model For Cloud Computing with Caching Notion

    In this paper, the authors propose a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext and the party responsible for data encryption and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Security and Performance Outsourcing Over Cloud Computing Using Linear Programming

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adhoc Network Security Using Dynamic IP Configuration

    In MANETs, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In the authors' paper, they present an ID based dynamic IP configuration scheme that can securely allocate IP addresses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Third Party Auditing For Dynamic Data

    In cloud storage system, the client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. Existing protocols support both features with the help...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preservation Against Traffic Analysis Using Random Network Coding in Multi-Hop Wireless Networks

    In multi-hop wireless networks, privacy threat is one of the critical issues, where attacks such as traffic analysis can be easily launched by a malicious adversary due to the open-air transmission. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ontology Based Semantic Annotation Framework

    In this paper, the authors present a semantic annotation framework that is capable of extracting appropriate information from unstructured, ungrammatical and unintelligible data sources. The framework, named BNOSA, uses ontology to conceptualize a problem domain and to extract data from the given corpora and Bayesian networks to resolve conflicts and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy Based IP Traceback Against DDOS Attacks

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory-less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Connectivity at Failures By ISPs with Minimum Cost

    Often users face risk of failures on many links or routers in Internet for various reasons, such as fiber cuts, failure of transmission devices, misconfiguration of routers and overloading of routers. Internet is required to be robust enough to sustain connectivity between nodes and maintain stable services in the event...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Competent Communication for Time-Critical Applications in Sunken Sensor Networks

    The main features of acoustic channels are long propagation delay and high error probability. So, it is very challenging to provide energy-efficient reliable data transfer for time critical applications such as pollution monitoring and submarine detection. In traditional retransmission upon failure, very large end-to-end delay occurs and therefore it is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Profile SVM with Distribution Management Model

    Classification techniques are used to assign category labels for the transactions. Global and local learning models are used in the classification process. Global characteristics of the data are analyzed in the global learning. Nonlinear Support Vector Machine (SVM) is a popular global learning technique. Global learning technique faces model selection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis For Threshold-Based Online Congestion-Aware Routing Algorithm

    Alternate optical network architecture, called translucent network to the fully transparent and fully opaque network architecture is investigated. In a translucent wavelength-routed optical network, a technique called sparse regeneration is used to overcome the severe light path blocking due to signal quality degradation and wavelength contention in a fully transparent...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient and Reducing Delay for Data Gathering in Wireless Sensor Networks

    In this paper, the authors consider the problem of data collection from a sensor web consisting of N nodes, where nodes have packets of data in each round of communication that need to be gathered and fused with other nodes' packets into one packet and transmitted to a distant base...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Availability of Server Selection Policy

    Fault tolerance is one of the most important issues for achieving dependable distributed systems. There is a large amount of work on failure detection in network system that failures are transient. During the crash period, the server is unable to service any request. For detecting such failures, the authors are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking Misbehaving Users in Anonymizing Networks & Broadening Nymble System

    In this paper. The authors presents Nymble, a system in which servers can blacklist misbehaving users, thereby blocking users without compromising their anonymity. Their system is thus agnostic to different servers' definitions of misbehaviour servers can blacklist users for whatever reason and the privacy of blacklisted users is maintained. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Tree Zone Orieted Logic Using Geographic Protocol Over MANET

    In mobile ad Hoc network, group communications are different form. Multicast is a fundamental service for supporting information exchanges and collaborative task execution among a group of users. There are several multicast routing protocols in MANET have been shown to large overhead due to high networks dynamic topology. A number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Static Ram Cell Design for Low Power Consumption

    A low power Static-Random Access Memory (SRAM) has become a critical component in modern VLSI systems. In cells, the bit-lines are the most power consuming components because of larger power dissipation in driving long bit-line with large capacitance. The cache write consumes considerable large power due to full voltage swing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Error Tolerant Booth Multiplier for Lossy Applications

    Multipliers are the fundamental arithmetic unit in multimedia and digital signal processing applications. The fixed width multipliers are used in those applications where the authors have to maintain a fixed format and allow a little accuracy loss of output data. In this paper, they have proposed a low power technique...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Periodicity Stream-Mining Using Continuous Database

    Periodic stream mining or periodicity detection has a number of applications, such as prediction, forecasting, detection of unusual activities, etc. The data to be analyzed might be noisy (or) perfect data set for which periodicity is to be investigated. There is a need for a comprehensive approach capable of analyzing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Route Diversity in Tree Based Distributed Hash Tables

    Hash tables - which map "Keys" onto "Values" - are an essential building block in modern software systems. Nodes can deny access to keys or misroute lookups. In this paper address both of these problems through replica placement. Replica placement that creates route diversity for these DHTs. Using simulations of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Security Mechanism for Misbehaving Users in Wireless Mesh Network

    As a combination of ad hoc networks and Wireless Local Area Network (WLAN), the Wireless Mesh Network (WMN) provides a low-cost convenient solution to last-mile network connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are no longer applicable in WMNs....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ascendable Datacenter Servers Using Ficonn Bi-Port Structure

    This paper explores a new server-interconnection structure. The commodity server machines used in today's data centers usually come with two built-in Ethernet ports, one for network connection and the other left for backup purposes. Believe that if both ports are actively used in network connections, it can build a scalable,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Segmentation and Denoising of Surveillance Video Using Adaptive Gmm Towards Effective Video Retrieval

    In modern times, the advanced technologies in camera have made the video acquisition more feasible. Data sets collected by image sensors are generally contaminated by noise. Imperfect instruments, problems with the data acquisition process, and interfering natural phenomena can all degrade the data of interest. Surveillance sequences do not only...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Grouping Servicefor Senior Citizens

    SOA is a computing paradigm for generating distributed and heterogeneous software systems. Services are basic elements for generating application in SOA. Service is a platform independent, reusable and loosely coupled software component that is described, registered and discovered. The most obvious capability of SOA is assembling of several services to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Data Throughput Prediction and Optimization Service for Widely Distributedmany-Task Computing

    A data throughput prediction and optimization service for many-task computing in widely distributed environments. This service uses multiple parallel TCP streams to improve the end-to-end throughput of data transfers. A novel mathematical model is developed to determine the number of parallel streams, required to achieve the best network performance. This...

    Provided By International Journal of Communications and Engineering