International Journal of Communications and Engineering

Displaying 201-240 of 349 results

  • White Papers // Mar 2012

    Analysis of Optical Network with Soliton Propagation in DCF and EDFA Based Network

    The advancement in optical communication by the emergence of soliton pulse propagation with its distinct feature of retaining its shape through long distance transmission, have brought in lot of interest and applications in the field of optics. The hurdle to major advancement was the usage of expensive regenerators which has...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Analysis Attack On Elliptic Curve'S Point Multiplication

    Information is becoming a crucial if not the most important resource of the economy and the society at large. Information can be copied without cost, it can be communicated at the speed of light and it can be destroyed without leaving traces. This poses new challenges for the protection of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Security and Privacy in Biometric Cryptosystems for Trusted Authentication

    In this paper, the authors introduces a novel fingerprint matching algorithm using both ridge features and the conventional minutiae features to increase the recognition performance against non-linear deformation in fingerprints. The proposed ridge features are composed of four elements: ridge count, ridge length, ridge curvature direction and ridge type. These...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Study On XML Based Context-Driven Search Engine for Web Data Mining

    There is an ever-growing availability of semi structured information on the Web and in digital libraries. Increasingly, users, both expert and non expert, have access to text documents equipped with some semantic hints through XML markup. Loosely structured querying allows combining some structural constraints within a Keyword query by specifying...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Replication in Binary Tree Based Peer-To-Peer Network

    Distributed Hash Tables (DHTs) share storage and routing responsibility among all nodes in a peer-to-peer network. These networks have bounded path length unlike unstructured networks. Unfortunately, nodes can deny access to keys or misroute lookups. The authors address both of these problems through replica placement. They characterize binary tree-based routing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Scheduling and Security Mechanism for Multi Dimensional Resource Environment

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Resources are allocated for the dependant and independent tasks. Processor and memory are shared with the nodes under heterogeneous distributed system environment. Scheduling schemes are used for the resource allocation process. Heterogeneous...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    AP Centric and Deputy Forward Method for Location Oriented Content Delivery

    In this paper, a delay-sensitive service is introduced that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of Access Points (APs) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably introduce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Network Intrusion Detection Using Enhanced Adaboost Algorithm

    Network intrusion detection is a way to separate normal behaviors from the attacked ones. An Intrusion Detection System (IDS) gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions which are attacks from outside the organization and misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Intrusion Detection Framework To Avoid SQL Injection Attacks Using WASP Tool

    SQL injection attacks pose a serious threat to the security of Web applications because they can give attackers unrestricted access to databases that contain sensitive information. In this paper, the authors propose a new, highly automated approach for protecting existing Web applications against SQL injection. Their approach has conceptual advantages...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Bandwidth Efficient ANCR Scheme for Multi-Hop Wireless MBS

    In a wireless multi-hop environment the bandwidth requirement changes continuously and rapidly in each node. And also the network consumes a lot of bandwidth during multicast broadcast services. So a bandwidth and an energy efficient scheme called ANCR is deployed using network coding. The ANCR scheme uses two heuristic schemes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Personalized Ontology Model for Web Information Gathering

    For knowledge description and user profiles representation, ontology's are used in web information gathering. When representing user profiles, many models have utilized only knowledge from either a global knowledge base or user local information. The objective of this paper is to improve web information gathering performance by using ontological user...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Database Response Policies To Support Intrusion Response System for DBMS

    The intrusion response system is responsible for issuing a suitable response to an anomalous request. The interactive response policy language makes it very easy for the database administrators to specify appropriate response actions for different circumstances depending upon the nature of the anomalous request. The two main issues are address...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dual-Band Microstrip Patch Array Antenna Design for LTE and WLAN Application

    In this paper, a dual-band microstrip patch array antenna is designed for both the MIMO 4G LTE and the WLAN systems. Design simulation and optimization processes are carried out with the aid of the Advanced Design System (ADS) electromagnetic simulator .The losses that are caused by both the substrate and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Xquery Processing in Very Large XML Databases

    XML is flexible and powerful tool that enables vital security in heterogeneous environments. The availability of large amounts of heterogeneous web data necessitates the integration of xml data from multiple xml sources. The authors need merge, or make an effort to service customers in cooperation; there is need for an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Novel Approach to Edge Detection Using Wavelet Transform and Fuzzy Rules

    Edge detection is one of the preprocessing steps in image processing and computer vision applications, particularly in the area of object segmentation. It plays a vital role in image analysis and it is a key of solving many complex problems. Despite many existing traditional edge operators, which are based on...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Multicast Routing in MANETs

    Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this paper, the authors consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. They formulate this traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    IPv6 in Visual Sensor Network

    Visual sensor network is one of the emerging technologies which will have impact on users' daily life in near future. These wireless sensor nodes are expected to vastly out number conventional computer hosts as the authors see them today, but their strict resource constraints are unlike other technologies already common...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Conflict-Free Transmission With Dynamic Scheduling for Sensor Network Queries

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Privacy and Authorization in Grid Using Advanced Encryption Standard

    The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Microprocessor Cache Compression by Cellular Automata P-Match to Increase the Cache Capacity

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multiprocessors are used in the system design, more processors require more accesses to memory. Thus raising a, 'Wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip cache, two...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Methods for Handling Uncertainty in Decision Support System

    Data uncertainty is common in real world applications due to various causes, including imprecise measurements, network latency, out dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. In this paper, the authors are describing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

    The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Update for Anonymous Database

    Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process. Privacy preservation is applied to protect individual private information. Statistical and Anonymization...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Feature Set Based Classification Scheme Under Data Streams

    Classification techniques are used to identify the class labels for the transactions. The classification operations are applied on the database transactions. Data streams are one of the major data source for many applications. The data values are collected from one or more sources. The data stream classification is a complex...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

    Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for Parallel Data Processing in Cloud Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Data Security Impact and in Parallel Cloud Computing

    Cloud Computing users can access database resources via the Internet from anywhere, as long as they need without worrying about any maintenance or management of actual resources. Besides, databases in cloud are very dynamic and scalable. The people early thoughts on interconnecting clouds for dynamically creating an atmospheric computing environment...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Model of Intelligent Hybrid Network Intrusion Detection System

    The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered on attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Multiple Level Visual Cryptography Scheme for Biometric Privacy Without Pixel Expansion

    Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Operational Load Balancing System for P2P Architecture With Range Query Processing

    Distributed computing is being used in several fields to solve many computation intensive problems. There has been recent interest in developing Peer-To-Peer (P2P) networks that can support ad-hoc queries over key ranges. A solution is to use range partitioning of data across the peer nodes. If the data and query...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Access Security and Holistic Hybrid Approach to Solve the Anomalies

    Radio Frequency IDentification (RFID) technologies are used in many applications for data collection. However, raw RFID readings are usually of low quality and may contain many anomalies. In the practical situations, particularly where a number of readers and other wireless devices share the same frequency band, the performance on the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Location Constrained Data Transmission Mechanism for MANET

    Mobile ad hoc networks are temporary networks. No fixed infrastructure is used for MANET. The base stations, towers, routers and retransmission switches are not used in the mobile ad-hoc networks. The mobile nodes act as the routers. All the data transmission is carried out through the intermediate nodes. MANETs are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Novel Detection Method for Anonymous Network Attacks Tomitigate and Traceback Ddos

    DOS attacks represent a growing threat to the internet infrastructure, by denying regular internet services from being accessed by legitimate users. IP traceback is the process of identifying the actual source(s) of attack packets, So that the attackers can be held accountable as Considering the spherical/Ellipsoidal topology of the earth,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Multistep Nearest Neighbour Search in Data Mining

    Multistep processing is commonly used for Nearest Neighbor (NN) and similarity search in applications involving high-dimensional data and costly distance computations. Today, many such applications require a proof of result correctness. In this setting, clients issue NN queries to a server that maintains a database signed by a trusted authority....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Realtime Intrusion Detection for Wireless Networks Based on Aodv Routing Protocol

    Security of wireless ad hoc network over insecure communication channel is a challenging task. In this paper, some of the threats to wireless ad hoc networks and specifically, some attacks against the AODV routing protocol re discussed. AODV tool is aimed at real-time detection of these attacks. This tool monitors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Path Based Energy Efficient Fast Reconfiguration Mechanism in Wireless Mesh Network

    Frequent link failures are experienced in multi-hop wireless networks, due to channel interference, dynamic obstacles and bandwidth demands. These failures cause severe performance degradation in wireless mesh network, which needs manual network management for recovery. An Autonomous network Reconfiguration System (ARS) algorithm is proposed in this paper, to overcome the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secrecy and Cooperative Firewall Policies in Virtual Private Network

    Virtual Private Network (VPN) is a globally used technology allows the user to create encrypted tunnel. CDCF (Cross-Domain Cooperative Firewall) is vulnerable to selective policy updating attacks, by which the policy owner can quickly reveal the request of the other party. Furthermore, CDCF is inefficient because it uses commutative encryption...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi-Populated Parallel Genetic Algorithm for Outlier Detection

    Outlier detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. Fundamental issue is that the notion of objects that are outliers typically varies between users, problems, domains or even datasets. Various researches have been carried out with different methods for outlier detection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Virtual Systems Workload Characterization

    Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single workload benchmark is useful in quantifying the virtualization overhead within a single VM, but not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Data Retrieval Clustering Based Anomaly Intrusion Detection System in Mining Process With Time Prediction

    A network intrusion is any type of attack or malicious activity that can compromise the stability or security of a network environment. Intruders can be classified in two groups. External intruders don't have authorized access to the system or network they attack, while internal intruders have some authority access to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Clustering and Gateway Management in Vehicular Ad-Hoc Networks

    Vehicle Ad Hoc NETworks (VANETs), based on IEEE 802.11p, and 3G & beyond networks are characterized by their high data transmission rates and wide range communication respectively. Coupling the high data rates of IEEE 802.11p-based VANETs and the wide coverage area of 3GPP networks (e.g., UMTS), this envisions a VANET-UMTS...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Based Record Retrieval for Text Classification

    Feature selection is an important preprocessing step for problems of high dimension such as text categorization. Text categorization is a fundamental technique to mine massive amount of textual data. The problem is of high dimension and most of the machine learning algorithms does not perform well with all the terms...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constraint Based Record Matching

    Record matching, which identifies the records that represents the same real world entity is an important step for data integration. Most state-of-the-art record matching methods are supervised including the UDD which is termed and expected to be unsupervised. In web database scenario, the records to be matched are query results,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Conflict-Free Transmission With Dynamic Scheduling for Sensor Network Queries

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Privacy and Authorization in Grid Using Advanced Encryption Standard

    The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Microprocessor Cache Compression by Cellular Automata P-Match to Increase the Cache Capacity

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multiprocessors are used in the system design, more processors require more accesses to memory. Thus raising a, 'Wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip cache, two...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Methods for Handling Uncertainty in Decision Support System

    Data uncertainty is common in real world applications due to various causes, including imprecise measurements, network latency, out dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. In this paper, the authors are describing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

    The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Update for Anonymous Database

    Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process. Privacy preservation is applied to protect individual private information. Statistical and Anonymization...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Feature Set Based Classification Scheme Under Data Streams

    Classification techniques are used to identify the class labels for the transactions. The classification operations are applied on the database transactions. Data streams are one of the major data source for many applications. The data values are collected from one or more sources. The data stream classification is a complex...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

    Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for Parallel Data Processing in Cloud Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Data Security Impact and in Parallel Cloud Computing

    Cloud Computing users can access database resources via the Internet from anywhere, as long as they need without worrying about any maintenance or management of actual resources. Besides, databases in cloud are very dynamic and scalable. The people early thoughts on interconnecting clouds for dynamically creating an atmospheric computing environment...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Model of Intelligent Hybrid Network Intrusion Detection System

    The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered on attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Multiple Level Visual Cryptography Scheme for Biometric Privacy Without Pixel Expansion

    Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Realtime Intrusion Detection for Wireless Networks Based on Aodv Routing Protocol

    Security of wireless ad hoc network over insecure communication channel is a challenging task. In this paper, some of the threats to wireless ad hoc networks and specifically, some attacks against the AODV routing protocol re discussed. AODV tool is aimed at real-time detection of these attacks. This tool monitors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Path Based Energy Efficient Fast Reconfiguration Mechanism in Wireless Mesh Network

    Frequent link failures are experienced in multi-hop wireless networks, due to channel interference, dynamic obstacles and bandwidth demands. These failures cause severe performance degradation in wireless mesh network, which needs manual network management for recovery. An Autonomous network Reconfiguration System (ARS) algorithm is proposed in this paper, to overcome the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secrecy and Cooperative Firewall Policies in Virtual Private Network

    Virtual Private Network (VPN) is a globally used technology allows the user to create encrypted tunnel. CDCF (Cross-Domain Cooperative Firewall) is vulnerable to selective policy updating attacks, by which the policy owner can quickly reveal the request of the other party. Furthermore, CDCF is inefficient because it uses commutative encryption...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi-Populated Parallel Genetic Algorithm for Outlier Detection

    Outlier detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. Fundamental issue is that the notion of objects that are outliers typically varies between users, problems, domains or even datasets. Various researches have been carried out with different methods for outlier detection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Virtual Systems Workload Characterization

    Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single workload benchmark is useful in quantifying the virtualization overhead within a single VM, but not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Data Retrieval Clustering Based Anomaly Intrusion Detection System in Mining Process With Time Prediction

    A network intrusion is any type of attack or malicious activity that can compromise the stability or security of a network environment. Intruders can be classified in two groups. External intruders don't have authorized access to the system or network they attack, while internal intruders have some authority access to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Dimensional Data Anonymous Publication and Updates to Confidential Databases

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Red Protocol for the Detection of Clone Attacks

    One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Powerful Pattern Matching Algorithm for Embedded Network Security

    Network security applications generally require the ability to perform powerful pattern matching to protect against attacks such as viruses and spam. Traditional hard-ware solutions are intended for firewall routers. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Safe Cloud Storage With Multiple Cloud Servers

    Cloud computing was formerly intended for dealing with difficulties relating huge volumes of data and/or compute-intensive applications. Today, however, Clouds enlarged their skyline as they are going to run both scientific and business applications supporting scientists, professionals and end users. Thus, clouds promise to be for scientists an alternative to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Distance Based Energy Aware Routing in Wireless Sensor Networks

    Wireless sensor Network function with many routing protocols from the LEACH to high power short distance routing protocol. Still there are some unresolved issues in routing protocol in wireless sensor networks. In this paper the proposed algorithm is distance based energy aware routing named as DER. The distance based energy...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VLSI Based High-Throughput Multistandard Convolutional Turbo Scalable Map Processor Design

    Most of advanced wireless standards, such as WiMAX and LTE, have adopted different Convolutional Turbo Code (CTC) schemes with various block sizes and throughput rates. Thus, a reconfigurable and scalable hardware accelerator for multi standard CTC decoding is necessary. In this paper, the authors propose scalable Maximum A Posteriori algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Frequent Patterns Based on Incremental Mining Model for Uncertain Databases

    A database is viewed as a set of deterministic instances. Possible world refers the finite number of tuples with finite attributes. Uncertain database contains an exponential number of possible worlds. Rule mining algorithms are used to extract frequent item sets. The candidate sets and item sets are extracted from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Privacy in Location-Based Services

    The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adaptive Rate Control Cryptographic Active Voice Transcoding (ARC-CAVT) Congestion Control Mechanism for Voice Over IP (VOIP) Transmission - A Case Study

    The quality of bulky real time voice communication over an IP network degrades due to packet header overhead, network congestion and improper queuing strategies. These overheads affect the overall IP network performance and QoS parameters of voice communication such as packet loss, packet delay and packet latency or jitter. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Query Performance Using Semantic Overlay Creation

    In a Peer-To-Peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding tends to be very expensive. In this paper it is proposed that node connections be influenced by content, so that for example, nodes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Countermeasure Against Parasitic Adversaries in Wireless Sensor Network

    Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, the authors first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a counter-measure, they first...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Digital PID Feedback Controller for a Buck Converter

    The design of a digital controller is presented for a dc-dc converter. Digital control of dc-dc converter using DSP is becoming more and more common in industry today. Starting with a dc-dc buck converter and a given set of performance specifications, a digital PID controller is designed and implemented in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Layer Conflict Detecting by Improve the Routing Performance

    Cross layer conflicts occur due to mismatch or misalignment of routing objectives. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load. In the authors' work, they build on past...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Protocol for Remote Data Possession Checking in Cloud

    Cloud storage enables users to remotely store their data without the burden of local hardware and software management. Once data goes into the cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. While previously proposed protocols fail to provide strong security assurance...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy in Mobile Social Networking

    Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of Smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    License Authentication Security System Using RFID

    This paper describes the theft of two wheeler vehicles probably causes less anxiety to the public than household burglary, it is a crime which occurs one and half times more frequently than other thefts. This report examines, for a technical readership, the security weaknesses of existing vehicle designs and considers...

    Provided By International Journal of Communications and Engineering