International Journal of Communications and Engineering

Displaying 241-280 of 349 results

  • White Papers // Mar 2012

    Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

    The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Update for Anonymous Database

    Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process. Privacy preservation is applied to protect individual private information. Statistical and Anonymization...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Feature Set Based Classification Scheme Under Data Streams

    Classification techniques are used to identify the class labels for the transactions. The classification operations are applied on the database transactions. Data streams are one of the major data source for many applications. The data values are collected from one or more sources. The data stream classification is a complex...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

    Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for Parallel Data Processing in Cloud Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Data Security Impact and in Parallel Cloud Computing

    Cloud Computing users can access database resources via the Internet from anywhere, as long as they need without worrying about any maintenance or management of actual resources. Besides, databases in cloud are very dynamic and scalable. The people early thoughts on interconnecting clouds for dynamically creating an atmospheric computing environment...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Model of Intelligent Hybrid Network Intrusion Detection System

    The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered on attack or a normal behavior. Though IDS has been developed for many years, the large number of return alert messages makes managers maintain...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Multiple Level Visual Cryptography Scheme for Biometric Privacy Without Pixel Expansion

    Preserving the privacy of digital biometric data (e.g., face images) stored in a central database has become of paramount importance. This work explores the possibility of using visual cryptography for imparting privacy to biometric data such as fingerprint images, iris codes, and face images. In the case of faces, a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Realtime Intrusion Detection for Wireless Networks Based on Aodv Routing Protocol

    Security of wireless ad hoc network over insecure communication channel is a challenging task. In this paper, some of the threats to wireless ad hoc networks and specifically, some attacks against the AODV routing protocol re discussed. AODV tool is aimed at real-time detection of these attacks. This tool monitors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi Path Based Energy Efficient Fast Reconfiguration Mechanism in Wireless Mesh Network

    Frequent link failures are experienced in multi-hop wireless networks, due to channel interference, dynamic obstacles and bandwidth demands. These failures cause severe performance degradation in wireless mesh network, which needs manual network management for recovery. An Autonomous network Reconfiguration System (ARS) algorithm is proposed in this paper, to overcome the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secrecy and Cooperative Firewall Policies in Virtual Private Network

    Virtual Private Network (VPN) is a globally used technology allows the user to create encrypted tunnel. CDCF (Cross-Domain Cooperative Firewall) is vulnerable to selective policy updating attacks, by which the policy owner can quickly reveal the request of the other party. Furthermore, CDCF is inefficient because it uses commutative encryption...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multi-Populated Parallel Genetic Algorithm for Outlier Detection

    Outlier detection problem has important applications in the field of fraud detection, network robustness analysis and intrusion detection. Fundamental issue is that the notion of objects that are outliers typically varies between users, problems, domains or even datasets. Various researches have been carried out with different methods for outlier detection...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Virtual Systems Workload Characterization

    Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single workload benchmark is useful in quantifying the virtualization overhead within a single VM, but not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Data Retrieval Clustering Based Anomaly Intrusion Detection System in Mining Process With Time Prediction

    A network intrusion is any type of attack or malicious activity that can compromise the stability or security of a network environment. Intruders can be classified in two groups. External intruders don't have authorized access to the system or network they attack, while internal intruders have some authority access to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Dimensional Data Anonymous Publication and Updates to Confidential Databases

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Red Protocol for the Detection of Clone Attacks

    One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Powerful Pattern Matching Algorithm for Embedded Network Security

    Network security applications generally require the ability to perform powerful pattern matching to protect against attacks such as viruses and spam. Traditional hard-ware solutions are intended for firewall routers. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Safe Cloud Storage With Multiple Cloud Servers

    Cloud computing was formerly intended for dealing with difficulties relating huge volumes of data and/or compute-intensive applications. Today, however, Clouds enlarged their skyline as they are going to run both scientific and business applications supporting scientists, professionals and end users. Thus, clouds promise to be for scientists an alternative to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Distance Based Energy Aware Routing in Wireless Sensor Networks

    Wireless sensor Network function with many routing protocols from the LEACH to high power short distance routing protocol. Still there are some unresolved issues in routing protocol in wireless sensor networks. In this paper the proposed algorithm is distance based energy aware routing named as DER. The distance based energy...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VLSI Based High-Throughput Multistandard Convolutional Turbo Scalable Map Processor Design

    Most of advanced wireless standards, such as WiMAX and LTE, have adopted different Convolutional Turbo Code (CTC) schemes with various block sizes and throughput rates. Thus, a reconfigurable and scalable hardware accelerator for multi standard CTC decoding is necessary. In this paper, the authors propose scalable Maximum A Posteriori algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Frequent Patterns Based on Incremental Mining Model for Uncertain Databases

    A database is viewed as a set of deterministic instances. Possible world refers the finite number of tuples with finite attributes. Uncertain database contains an exponential number of possible worlds. Rule mining algorithms are used to extract frequent item sets. The candidate sets and item sets are extracted from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Privacy in Location-Based Services

    The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Scheduling Algorithm for Minimizing The Queue Over-Flow Probability in Cellular Networks

    The use of optimization and economic ideas in network resource allocation has a long history, going back to the study of transportation networks. The proposal is to use as adaptation variables the components of rate for each path from source to destination. In this paper, a wireless scheduling algorithms for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multicast Content Delivery in Multimedia using Protocol Independent Multicast Sparse Mode (PIM-SM)

    Traffic Engineering is the emerging mechanism for the Internet Network Provider required optimizing network performance and traffic delivery. In the multicast communication the message is transferred from one sender to various active receivers instead of all receivers like broadcast communication. Traffic is a major problem in the multicast communication which...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Routing in Dynamic AODV Protocol for Predicting Route Lifetime

    A Mobile Ad-hoc NETwork is defined as a transient network which is formed dynamically by the collection of nodes which are arbitrary. It can also be called as infrastructure less network, because it has no structure frame for positioning the nodes, these nodes are combined and this union forms a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Minimizing Transmit Power Using Efficient and Reliable Routing Protocol in Wireless Sensor Networks for Avionics

    The main design issues for a sensor network are conservation of energy available at each sensor node. Nodes have limited energy and forward messages of different priorities are frequent in wireless sensor networks. In this paper, reliable selective forwarding is based on available battery, importance of messages, problems of interference...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Effective Frequent Pattern Mining with Systolic Tree on Reconfigurable Platform

    In business, companies are working fast to gain a valuable competitive advantage over other businesses. A fast-growing and popular technology, which can help to gain this advantage, is data mining. Data mining technology allows a company to use the mass quantities of data that it has compiled and develop correlations...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Map-Reduce Function for Cloud Data Storage and Data Integrity Auditing by Trusted TPA

    Delivering IT-enabled services via the internet that are built for the end user to be in control is what has come to be called 'Cloud computing'. Computing resources such as processing power, storage, database and messaging are no longer confined within the four walls of an enterprise. Due to lack...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimisation of Path Using Genetic Algorithm for Wireless Sensor Networks

    In the wireless sensor networks, one of the most important and challenging problem in designing process is to develop an efficient routing protocol for providing the high traffic load which causes a data queue overflow in the sensor nodes. Since this queue overflow may causes data transmission failures, so to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Geographic Routing with Local Face Information without Planarization

    Geographic routing also called position-based routing is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. The paper designs new geographic routing algorithms, namely Greedy Distributed Spanning Tree Routing (GDSTR)...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mobility and Traffic Model Data Dissemination in Vehicular Networks

    Vehicular networks have great interest in the research community and multihop data dissemination has become an important issue. Vehicular adhoc network is a type of mobile adhoc network, in which mobile nodes forming temporary or short lived network without any fixed infrastructure. This paper proposed the concept of data dissemination...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Dimensional Data Anonymous Publication and Updates to Confidential Databases

    Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Red Protocol for the Detection of Clone Attacks

    One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Powerful Pattern Matching Algorithm for Embedded Network Security

    Network security applications generally require the ability to perform powerful pattern matching to protect against attacks such as viruses and spam. Traditional hard-ware solutions are intended for firewall routers. However, the solutions in the literature for firewalls are not scalable, and they do not address the difficulty of an antivirus...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Safe Cloud Storage With Multiple Cloud Servers

    Cloud computing was formerly intended for dealing with difficulties relating huge volumes of data and/or compute-intensive applications. Today, however, Clouds enlarged their skyline as they are going to run both scientific and business applications supporting scientists, professionals and end users. Thus, clouds promise to be for scientists an alternative to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Distance Based Energy Aware Routing in Wireless Sensor Networks

    Wireless sensor Network function with many routing protocols from the LEACH to high power short distance routing protocol. Still there are some unresolved issues in routing protocol in wireless sensor networks. In this paper the proposed algorithm is distance based energy aware routing named as DER. The distance based energy...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    VLSI Based High-Throughput Multistandard Convolutional Turbo Scalable Map Processor Design

    Most of advanced wireless standards, such as WiMAX and LTE, have adopted different Convolutional Turbo Code (CTC) schemes with various block sizes and throughput rates. Thus, a reconfigurable and scalable hardware accelerator for multi standard CTC decoding is necessary. In this paper, the authors propose scalable Maximum A Posteriori algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Frequent Patterns Based on Incremental Mining Model for Uncertain Databases

    A database is viewed as a set of deterministic instances. Possible world refers the finite number of tuples with finite attributes. Uncertain database contains an exponential number of possible worlds. Rule mining algorithms are used to extract frequent item sets. The candidate sets and item sets are extracted from the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Privacy in Location-Based Services

    The pervasive diffusion of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. In such a context, privacy concerns are increasing and call for sophisticated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adaptive Rate Control Cryptographic Active Voice Transcoding (ARC-CAVT) Congestion Control Mechanism for Voice Over IP (VOIP) Transmission - A Case Study

    The quality of bulky real time voice communication over an IP network degrades due to packet header overhead, network congestion and improper queuing strategies. These overheads affect the overall IP network performance and QoS parameters of voice communication such as packet loss, packet delay and packet latency or jitter. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving Query Performance Using Semantic Overlay Creation

    In a Peer-To-Peer (P2P) system, nodes typically connect to a small set of random nodes (their neighbors), and queries are propagated along these connections. Such query flooding tends to be very expensive. In this paper it is proposed that node connections be influenced by content, so that for example, nodes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Countermeasure Against Parasitic Adversaries in Wireless Sensor Network

    Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are hard to defend against. In this paper, the authors first identify a typical attacker, called parasitic adversary, who seeks to exploit sensor networks by obtaining measurements in an unauthorized way. As a counter-measure, they first...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation of Digital PID Feedback Controller for a Buck Converter

    The design of a digital controller is presented for a dc-dc converter. Digital control of dc-dc converter using DSP is becoming more and more common in industry today. Starting with a dc-dc buck converter and a given set of performance specifications, a digital PID controller is designed and implemented in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Cross Layer Conflict Detecting by Improve the Routing Performance

    Cross layer conflicts occur due to mismatch or misalignment of routing objectives. The objectives of overlay routing, such as optimizing end-to-end latency, are often in conflict with the objectives of traffic engineering in the native layer, which is concerned about balancing load. In the authors' work, they build on past...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Protocol for Remote Data Possession Checking in Cloud

    Cloud storage enables users to remotely store their data without the burden of local hardware and software management. Once data goes into the cloud they lose control of their data, which inevitably brings new security risks toward integrity and confidentiality. While previously proposed protocols fail to provide strong security assurance...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy in Mobile Social Networking

    Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of Smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    License Authentication Security System Using RFID

    This paper describes the theft of two wheeler vehicles probably causes less anxiety to the public than household burglary, it is a crime which occurs one and half times more frequently than other thefts. This report examines, for a technical readership, the security weaknesses of existing vehicle designs and considers...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Web Mining Using Page Rank Algorithm Based Genetic Relation Algorithm

    Data mining is a new method in retrieving the knowledge from the large database. Data mining nowadays plays an important role in searching the information on the web that includes a high variety of data types. For reaching this goal, data mining techniques has been used as web mining. As...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralised Approach for Service Composition in Wireless Sensor Networks

    Wireless sensor network is a highly distributed network with small wireless nodes that are deployed in large numbers to monitor the environment by measurements of physical parameters. Wireless sensor networks have limited bandwidth, processing power and energy. Each node in the wireless sensor network may provide multiple services that when...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Jamming Detection and Mitigation Using Code Tree in Wireless Broadcast Networking

    Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric-operations: a user that possesses the key to decode a transmission can...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Characteristic Based Modelling Approach for Social Networking Management Using Objectmodelling Technology

    Social networking systems are of modern day interest to the fast growing IT Sector. The paper proposes a set of diagrams based on object orientation principle which describes hardware and software functionalities. The diagrams depicts the functional, behavioral and structural aspects of the embedded electronics system. The proposed modeling methodology...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Computation Efficient Multicast Key Distribution

    In the secure group communication a group key is shared by all the users. The group key is used to encrypt data transmitted to the group. The group membership is dynamic. When group membership changes, to protect the confidentiality of the current users, a new group key needs to be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Emergency Message Dissemination in Two Dimensional Space Using Percolation Phenomenon

    Vehicular Ad-hoc NETworks (VANETs) are an important part of Intelligent Transport System (ITS) which is used to avoid traffic congestion, improve traffic efficiency and to prevent accidents for enhancing road safety. In this paper, a modified Time and Location Critical (M-TLC) framework for dissemination of emergency messages is proposed. In...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Persistent Communication Using Ednr Protocol in Manet

    The main motivation of this paper is to provide Quality of Service (QoS) guarantees in mobile ad hoc networks. In mobile ad hoc networks, a host may lose its energy or roam independently without informing to its cooperative nodes, causing changes in network topology, and thus, these changes cause overwhelming...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Acknowledgement Based Scheme to Defend Against Cooperative Black Hole Attacks in DSR Routing Protocol

    Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. The authors propose a routing-aware multiple description video coding approach to support video transmission over mobile ad-hoc networks with multiple path transport. They build a statistical model to estimate the packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Preventive Mechanism for Blocking Attact of Maobile Agents in Secured Layer Architecture

    In distributed computing, mobile agent plays a major role as it is utilizing the resources available on the connected network and its capability of operation on different environments. When an agent migrates from one node to another node to fulfill the task of its owner, the agent route is decided...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Extended Security for Intrusion Detection System Using Data Cleaning in Large Database

    A suitable response to an atypical request is issued by the intrusion detection system. The concept of database response policies to support the intrusion response system adapted for a database management system is proposed. Depending on the nature of the anomalous request, the database administrators provide the response actions for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Digital Video Broadcasting-T2: Multiple Input Multiple Output Configuration

    This paper explores the possibility of implementing multiple antennas at the transmission side with multiple receiving antennas which is technically called as Multiple Input Multiple Output (MIMO) configuration. Digital Video Broadcasting Terrestrial Second generation (DVB-T2) is chosen as a potential digital signal broadcasting technology for the above. Orthogonal Frequency Division...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improved Performance Using Efficient Clustering in Wireless Networks

    The main difficulty of routing based on a predefined set of customer preferences is critical factor for guaranteeing quality-of-service in complex distributed system. The main aim of this paper is to improve performance of QOS by providing fault tolerance with efficient utilization of energy. Performance is analyzed for both FDCB...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Modified Autonomous Network Reconfiguration System for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. During their lifetime, multihop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles, and/or applications' bandwidth demands. Modified Autonomous network Reconfiguration System...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design of Low Power Fir Filter Using Improved Carry Select Adder

    Design of area- and power efficient high-speed data path logic system forms the largest areas of research in VLSI system design. In digital adders, the speed of addition is limited by the time required to transmit a carry through the adder. Carry SeLect Adder (CSLA) is one of the fastest...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting the Data Leakage Using Fake Objects

    A data distributor has given sensitive data to a set of supposedly trusted agents. Some of the data are leaked and found in an unauthorized place. The distributor must assess the likelihood that the leaked data came from one or more agents as opposed to having been independently gathered by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving of Digital Data Using Complex Non Linear Adaptive Filtering

    In the Field of Signal Processing in Encrypted Domain (SPED) has emerged in order to provide efficient and secure solutions for preserving privacy of signals that are processed by untrusted agents. In this work, privacy problem of adaptive filtering is one of most important and ubiquitous blocks in signal processing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphic Encryption Scheme

    k-anonymization optimization algorithm, serves as a vital-privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymizationis vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient-only but in practice, data sources are dynamically growing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Critical Event Monitoring in Wsnusing Sleep Scheduling

    This paper explores a novel sleep scheduling method to reduce the delay of alarm broadcasting from any sensor node in WSNs. When a critical event occurs, an alarm message should be broadcast to the entire network. Specifically, there are two determined traffic paths for the transmission of alarm message, and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Sensor Network Queries With Contest Free Transmission

    In wireless sensor networks the performance of query services is increased due to the emergence of high data rate sensor network applications. To meet this challenge, a Dynamic Conflict free Query Scheduling (DCQS), this is a novel scheduling technique for queries in wireless sensor networks. DCQS is specifically designed for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Automated Personal Identification Using Fusion of Iris

    Biometrics are measurable in physiological and or behavioral characteristics and can be used to verify the identity of the individual. Proposed work based on personal identification approaches using iris images. Approaches related to both canny edge detection and parabolic Hough transform to detect the iris boundaries in the eye's digital...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Socionet Using Cluster Based Intelligent Search Algorithm

    Peer-To-Peer (P2P) networks establish loosely coupled application-level overlays on top of the Internet to facilitate efficient sharing of resources. They can be roughly classified as either structured or unstructured networks. Without stringent constraints over the network topology, unstructured P2P networks can be constructed very efficiently and are therefore considered suitable...

    Provided By International Journal of Communications and Engineering