International Journal of Communications and Engineering

Displaying 241-280 of 349 results

  • White Papers // Mar 2012

    High Dimensional Data Anonymous Publication and Updates to Confidential Databases

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Red Protocol for the Detection of Clone Attacks

    One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Powerful Pattern Matching Algorithm for Embedded Network Security

    Network security applications generally require the ability to perform powerful pattern matching to protect against attacks such as viruses and spam. Traditional hard-ware solutions are intended for firewall routers. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Safe Cloud Storage With Multiple Cloud Servers

    Cloud computing was formerly intended for dealing with difficulties relating huge volumes of data and/or compute-intensive applications. Today, however, Clouds enlarged their skyline as they are going to run both scientific and business applications supporting scientists, professionals and end users. Thus, clouds promise to be for scientists an alternative to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Distance Based Energy Aware Routing in Wireless Sensor Networks

    Wireless sensor Network function with many routing protocols from the LEACH to high power short distance routing protocol. Still there are some unresolved issues in routing protocol in wireless sensor networks. In this paper the proposed algorithm is distance based energy aware routing named as DER. The distance based energy...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VLSI Based High-Throughput Multistandard Convolutional Turbo Scalable Map Processor Design

    Most of advanced wireless standards, such as WiMAX and LTE, have adopted different Convolutional Turbo Code (CTC) schemes with various block sizes and throughput rates. Thus, a reconfigurable and scalable hardware accelerator for multi standard CTC decoding is necessary. In this paper, the authors propose scalable Maximum A Posteriori algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Frequent Patterns Based on Incremental Mining Model for Uncertain Databases

    A database is viewed as a set of deterministic instances. Possible world refers the finite number of tuples with finite attributes. Uncertain database contains an exponential number of possible worlds. Rule mining algorithms are used to extract frequent item sets. The candidate sets and item sets are extracted from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Privacy in Location-Based Services

    The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adaptive Rate Control Cryptographic Active Voice Transcoding (ARC-CAVT) Congestion Control Mechanism for Voice Over IP (VOIP) Transmission - A Case Study

    The quality of bulky real time voice communication over an IP network degrades due to packet header overhead, network congestion and improper queuing strategies. These overheads affect the overall IP network performance and QoS parameters of voice communication such as packet loss, packet delay and packet latency or jitter. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Query Performance Using Semantic Overlay Creation

    In a Peer-To-Peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding tends to be very expensive. In this paper it is proposed that node connections be influenced by content, so that for example, nodes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Countermeasure Against Parasitic Adversaries in Wireless Sensor Network

    Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, the authors first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a counter-measure, they first...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Digital PID Feedback Controller for a Buck Converter

    The design of a digital controller is presented for a dc-dc converter. Digital control of dc-dc converter using DSP is becoming more and more common in industry today. Starting with a dc-dc buck converter and a given set of performance specifications, a digital PID controller is designed and implemented in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Layer Conflict Detecting by Improve the Routing Performance

    Cross layer conflicts occur due to mismatch or misalignment of routing objectives. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load. In the authors' work, they build on past...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Protocol for Remote Data Possession Checking in Cloud

    Cloud storage enables users to remotely store their data without the burden of local hardware and software management. Once data goes into the cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. While previously proposed protocols fail to provide strong security assurance...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy in Mobile Social Networking

    Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of Smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    License Authentication Security System Using RFID

    This paper describes the theft of two wheeler vehicles probably causes less anxiety to the public than household burglary, it is a crime which occurs one and half times more frequently than other thefts. This report examines, for a technical readership, the security weaknesses of existing vehicle designs and considers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Web Mining Using Page Rank Algorithm Based Genetic Relation Algorithm

    Data mining is a new method in retrieving the knowledge from the large database. Data mining nowadays plays an important role in searching the information on the web that includes a high variety of data types. For reaching this goal, data mining techniques has been used as web mining. As...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralised Approach for Service Composition in Wireless Sensor Networks

    Wireless sensor network is a highly distributed network with small wireless nodes that are deployed in large numbers to monitor the environment by measurements of physical parameters. Wireless sensor networks have limited bandwidth, processing power and energy. Each node in the wireless sensor network may provide multiple services that when...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Jamming Detection and Mitigation Using Code Tree in Wireless Broadcast Networking

    Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric-operations: a user that possesses the key to decode a transmission can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Characteristic Based Modelling Approach for Social Networking Management Using Objectmodelling Technology

    Social networking systems are of modern day interest to the fast growing IT Sector. The paper proposes a set of diagrams based on object orientation principle which describes hardware and software functionalities. The diagrams depicts the functional, behavioral and structural aspects of the embedded electronics system. The proposed modeling methodology...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Computation Efficient Multicast Key Distribution

    In the secure group communication a group key is shared by all the users. The group key is used to encrypt data transmitted to the group. The group membership is dynamic. When group membership changes, to protect the confidentiality of the current users, a new group key needs to be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Emergency Message Dissemination in Two Dimensional Space Using Percolation Phenomenon

    Vehicular Ad-hoc NETworks (VANETs) are an important part of Intelligent Transport System (ITS) which is used to avoid traffic congestion, improve traffic efficiency and to prevent accidents for enhancing road safety. In this paper, a modified Time and Location Critical (M-TLC) framework for dissemination of emergency messages is proposed. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Persistent Communication Using Ednr Protocol in Manet

    The main motivation of this paper is to provide Quality of Service (QoS) guarantees in mobile ad hoc networks. In mobile ad hoc networks, a host may lose its energy or roam independently without informing to its cooperative nodes, causing changes in network topology, and thus, these changes cause overwhelming...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Acknowledgement Based Scheme to Defend Against Cooperative Black Hole Attacks in DSR Routing Protocol

    Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. The authors propose a routing-aware multiple description video coding approach to support video transmission over mobile ad-hoc networks with multiple path transport. They build a statistical model to estimate the packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Preventive Mechanism for Blocking Attact of Maobile Agents in Secured Layer Architecture

    In distributed computing, mobile agent plays a major role as it is utilizing the resources available on the connected network and its capability of operation on different environments. When an agent migrates from one node to another node to fulfill the task of its owner, the agent route is decided...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Extended Security for Intrusion Detection System Using Data Cleaning in Large Database

    A suitable response to an atypical request is issued by the intrusion detection system. The concept of database response policies to support the intrusion response system adapted for a database management system is proposed. Depending on the nature of the anomalous request, the database administrators provide the response actions for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Digital Video Broadcasting-T2: Multiple Input Multiple Output Configuration

    This paper explores the possibility of implementing multiple antennas at the transmission side with multiple receiving antennas which is technically called as Multiple Input Multiple Output (MIMO) configuration. Digital Video Broadcasting Terrestrial Second generation (DVB-T2) is chosen as a potential digital signal broadcasting technology for the above. Orthogonal Frequency Division...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Performance Using Efficient Clustering in Wireless Networks

    The main difficulty of routing based on a predefined set of customer preferences is critical factor for guaranteeing quality-of-service in complex distributed system. The main aim of this paper is to improve performance of QOS by providing fault tolerance with efficient utilization of energy. Performance is analyzed for both FDCB...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Modified Autonomous Network Reconfiguration System for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. During their lifetime, multihop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications' bandwidth demands. Modified Autonomous network Reconfiguration System...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Low Power Fir Filter Using Improved Carry Select Adder

    Design of area- and power efficient high-speed data path logic system forms the largest areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to transmit a carry through the adder. Carry SeLect Adder (CSLA) is one of the fastest...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting the Data Leakage Using Fake Objects

    A data distributor has given sensitive data to a set of supposedly trusted agents. Some of the data are leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from one or more agents as opposed to having been independently gathered by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving of Digital Data Using Complex Non Linear Adaptive Filtering

    In the Field of Signal Processing in Encrypted Domain (SPED) has emerged in order to provide efficient and secure solutions for preserving privacy of signals that are processed by untrusted agents. In this work, privacy problem of adaptive filtering is one of most important and ubiquitous blocks in signal processing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

    k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Critical Event Monitoring in Wsnusing Sleep Scheduling

    This paper explores a novel sleep scheduling method to reduce the delay of alarm broadcasting from any sensor node in WSNs. When a critical event occurs, an alarm message should be broadcast to the entire network. Specifically, there are two determined traffic paths for the transmission of alarm message, and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Sensor Network Queries With Contest Free Transmission

    In wireless sensor networks the performance of query services is increased due to the emergence of high data rate sensor network applications. To meet this challenge, a Dynamic Conflict free Query Scheduling (DCQS), this is a novel scheduling technique for queries in wireless sensor networks. DCQS is specifically designed for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Automated Personal Identification Using Fusion of Iris

    Biometrics are measurable in physiological and or behavioral characteristics and can be used to verify the identity of the individual. Proposed work based on personal identification approaches using iris images. Approaches related to both canny edge detection and parabolic Hough transform to detect the iris boundaries in the eye's digital...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Socionet Using Cluster Based Intelligent Search Algorithm

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources. They can be roughly classified as either structured or unstructured networks. Without stringent constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Dimensional Data Anonymous Publication and Updates to Confidential Databases

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Red Protocol for the Detection of Clone Attacks

    One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Powerful Pattern Matching Algorithm for Embedded Network Security

    Network security applications generally require the ability to perform powerful pattern matching to protect against attacks such as viruses and spam. Traditional hard-ware solutions are intended for firewall routers. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Safe Cloud Storage With Multiple Cloud Servers

    Cloud computing was formerly intended for dealing with difficulties relating huge volumes of data and/or compute-intensive applications. Today, however, Clouds enlarged their skyline as they are going to run both scientific and business applications supporting scientists, professionals and end users. Thus, clouds promise to be for scientists an alternative to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Distance Based Energy Aware Routing in Wireless Sensor Networks

    Wireless sensor Network function with many routing protocols from the LEACH to high power short distance routing protocol. Still there are some unresolved issues in routing protocol in wireless sensor networks. In this paper the proposed algorithm is distance based energy aware routing named as DER. The distance based energy...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VLSI Based High-Throughput Multistandard Convolutional Turbo Scalable Map Processor Design

    Most of advanced wireless standards, such as WiMAX and LTE, have adopted different Convolutional Turbo Code (CTC) schemes with various block sizes and throughput rates. Thus, a reconfigurable and scalable hardware accelerator for multi standard CTC decoding is necessary. In this paper, the authors propose scalable Maximum A Posteriori algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Frequent Patterns Based on Incremental Mining Model for Uncertain Databases

    A database is viewed as a set of deterministic instances. Possible world refers the finite number of tuples with finite attributes. Uncertain database contains an exponential number of possible worlds. Rule mining algorithms are used to extract frequent item sets. The candidate sets and item sets are extracted from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Privacy in Location-Based Services

    The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adaptive Rate Control Cryptographic Active Voice Transcoding (ARC-CAVT) Congestion Control Mechanism for Voice Over IP (VOIP) Transmission - A Case Study

    The quality of bulky real time voice communication over an IP network degrades due to packet header overhead, network congestion and improper queuing strategies. These overheads affect the overall IP network performance and QoS parameters of voice communication such as packet loss, packet delay and packet latency or jitter. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Query Performance Using Semantic Overlay Creation

    In a Peer-To-Peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding tends to be very expensive. In this paper it is proposed that node connections be influenced by content, so that for example, nodes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Countermeasure Against Parasitic Adversaries in Wireless Sensor Network

    Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, the authors first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a counter-measure, they first...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Digital PID Feedback Controller for a Buck Converter

    The design of a digital controller is presented for a dc-dc converter. Digital control of dc-dc converter using DSP is becoming more and more common in industry today. Starting with a dc-dc buck converter and a given set of performance specifications, a digital PID controller is designed and implemented in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Layer Conflict Detecting by Improve the Routing Performance

    Cross layer conflicts occur due to mismatch or misalignment of routing objectives. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load. In the authors' work, they build on past...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Protocol for Remote Data Possession Checking in Cloud

    Cloud storage enables users to remotely store their data without the burden of local hardware and software management. Once data goes into the cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. While previously proposed protocols fail to provide strong security assurance...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy in Mobile Social Networking

    Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of Smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    License Authentication Security System Using RFID

    This paper describes the theft of two wheeler vehicles probably causes less anxiety to the public than household burglary, it is a crime which occurs one and half times more frequently than other thefts. This report examines, for a technical readership, the security weaknesses of existing vehicle designs and considers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Web Mining Using Page Rank Algorithm Based Genetic Relation Algorithm

    Data mining is a new method in retrieving the knowledge from the large database. Data mining nowadays plays an important role in searching the information on the web that includes a high variety of data types. For reaching this goal, data mining techniques has been used as web mining. As...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralised Approach for Service Composition in Wireless Sensor Networks

    Wireless sensor network is a highly distributed network with small wireless nodes that are deployed in large numbers to monitor the environment by measurements of physical parameters. Wireless sensor networks have limited bandwidth, processing power and energy. Each node in the wireless sensor network may provide multiple services that when...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Jamming Detection and Mitigation Using Code Tree in Wireless Broadcast Networking

    Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric-operations: a user that possesses the key to decode a transmission can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Characteristic Based Modelling Approach for Social Networking Management Using Objectmodelling Technology

    Social networking systems are of modern day interest to the fast growing IT Sector. The paper proposes a set of diagrams based on object orientation principle which describes hardware and software functionalities. The diagrams depicts the functional, behavioral and structural aspects of the embedded electronics system. The proposed modeling methodology...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Computation Efficient Multicast Key Distribution

    In the secure group communication a group key is shared by all the users. The group key is used to encrypt data transmitted to the group. The group membership is dynamic. When group membership changes, to protect the confidentiality of the current users, a new group key needs to be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Emergency Message Dissemination in Two Dimensional Space Using Percolation Phenomenon

    Vehicular Ad-hoc NETworks (VANETs) are an important part of Intelligent Transport System (ITS) which is used to avoid traffic congestion, improve traffic efficiency and to prevent accidents for enhancing road safety. In this paper, a modified Time and Location Critical (M-TLC) framework for dissemination of emergency messages is proposed. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Persistent Communication Using Ednr Protocol in Manet

    The main motivation of this paper is to provide Quality of Service (QoS) guarantees in mobile ad hoc networks. In mobile ad hoc networks, a host may lose its energy or roam independently without informing to its cooperative nodes, causing changes in network topology, and thus, these changes cause overwhelming...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Acknowledgement Based Scheme to Defend Against Cooperative Black Hole Attacks in DSR Routing Protocol

    Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. The authors propose a routing-aware multiple description video coding approach to support video transmission over mobile ad-hoc networks with multiple path transport. They build a statistical model to estimate the packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Preventive Mechanism for Blocking Attact of Maobile Agents in Secured Layer Architecture

    In distributed computing, mobile agent plays a major role as it is utilizing the resources available on the connected network and its capability of operation on different environments. When an agent migrates from one node to another node to fulfill the task of its owner, the agent route is decided...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Extended Security for Intrusion Detection System Using Data Cleaning in Large Database

    A suitable response to an atypical request is issued by the intrusion detection system. The concept of database response policies to support the intrusion response system adapted for a database management system is proposed. Depending on the nature of the anomalous request, the database administrators provide the response actions for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Digital Video Broadcasting-T2: Multiple Input Multiple Output Configuration

    This paper explores the possibility of implementing multiple antennas at the transmission side with multiple receiving antennas which is technically called as Multiple Input Multiple Output (MIMO) configuration. Digital Video Broadcasting Terrestrial Second generation (DVB-T2) is chosen as a potential digital signal broadcasting technology for the above. Orthogonal Frequency Division...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Performance Using Efficient Clustering in Wireless Networks

    The main difficulty of routing based on a predefined set of customer preferences is critical factor for guaranteeing quality-of-service in complex distributed system. The main aim of this paper is to improve performance of QOS by providing fault tolerance with efficient utilization of energy. Performance is analyzed for both FDCB...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Modified Autonomous Network Reconfiguration System for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. During their lifetime, multihop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications' bandwidth demands. Modified Autonomous network Reconfiguration System...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Low Power Fir Filter Using Improved Carry Select Adder

    Design of area- and power efficient high-speed data path logic system forms the largest areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to transmit a carry through the adder. Carry SeLect Adder (CSLA) is one of the fastest...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting the Data Leakage Using Fake Objects

    A data distributor has given sensitive data to a set of supposedly trusted agents. Some of the data are leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from one or more agents as opposed to having been independently gathered by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving of Digital Data Using Complex Non Linear Adaptive Filtering

    In the Field of Signal Processing in Encrypted Domain (SPED) has emerged in order to provide efficient and secure solutions for preserving privacy of signals that are processed by untrusted agents. In this work, privacy problem of adaptive filtering is one of most important and ubiquitous blocks in signal processing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

    k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Critical Event Monitoring in Wsnusing Sleep Scheduling

    This paper explores a novel sleep scheduling method to reduce the delay of alarm broadcasting from any sensor node in WSNs. When a critical event occurs, an alarm message should be broadcast to the entire network. Specifically, there are two determined traffic paths for the transmission of alarm message, and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Sensor Network Queries With Contest Free Transmission

    In wireless sensor networks the performance of query services is increased due to the emergence of high data rate sensor network applications. To meet this challenge, a Dynamic Conflict free Query Scheduling (DCQS), this is a novel scheduling technique for queries in wireless sensor networks. DCQS is specifically designed for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Automated Personal Identification Using Fusion of Iris

    Biometrics are measurable in physiological and or behavioral characteristics and can be used to verify the identity of the individual. Proposed work based on personal identification approaches using iris images. Approaches related to both canny edge detection and parabolic Hough transform to detect the iris boundaries in the eye's digital...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Socionet Using Cluster Based Intelligent Search Algorithm

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources. They can be roughly classified as either structured or unstructured networks. Without stringent constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable...

    Provided By International Journal of Communications and Engineering