International Journal of Communications and Engineering

Displaying 281-320 of 349 results

  • White Papers // Mar 2012

    Efficient Energy and Coverage Optimization in Dynamic Wireless Sensor Networks for Life Time Maximization

    Wireless Sensor Network usually have special life time requirements. However the density of the sensors may not be large enough to satisfy the coverage requirement while meeting the life time constraint at the same time. All the coverage is traded for network life time. In the past work maximize only...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Region Based Query Processing in Wireless Sensor Networks

    In Wireless Sensor Networks, nodes are subject to failure because of their non rechargeable batteries. When reading from individual node is encountered, it may yield noisy data. The effect of this can be reduced by making use of aggregated values of small group of sensors instead of the values of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimization of Resource Sharing in Structured Peer-To-Peer Networks

    Utilizing the skewed popularity distribution in P2P systems, common in Gnutella and KazaA like P2P applications, the authors propose an optimal resource (replica or link) placement strategy, which can optimally tradeoff the performance gain and paid cost. The proposed resource placement strategy, with better results than existing works, can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Optimization During Intrusion Detection in Wireless Sensor Networks

    In this modern era, Wireless Sensor Networks (WSN) is a booming technology that is used everywhere. Wireless Sensor Network consists of numerous sensor nodes deployed to monitor environmental conditions such as forest fire detection, military field, landslide monitoring, etc. The intrusion during wireless transmission is the most important challenge faced...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Low-Complexity PAPR Reduction Scheme for Interleaved and Sub-Band OFDMA Uplink Systems

    Both PAPR and computational complexity are critical challenges in OFDMA systems, especially for the mobile terminals. SLM schemes are commonly employed to reduce the PAPR in OFDM systems, but it requires many IFFT operations. In this paper, to decrease the number of IFFT operations and PAPR two methods are proposed....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Home Surveillance System Based on MCU and GSM

    Home embedded surveillance system are designed with group of sensors and Micro Controller Unit (MCU). This design consists of two group of sensors, outdoor and indoor. Pyroelectric InfraRed sensors (PIR) and pressure sensors as the alert group in windows and doors where an intruder must pass through. These outdoor sensors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Increasing The Life Time of Hetrogenous WSN Through ACO-MNCC

    Increasing the life time of heterogeneous Wireless Sensor Network (WSN) and minimizing the run time of the ACO-MNCC by using implicit parallelism. The computational time is very important for these searching algorithms. In this methodology, finding the maximum number of disjoints connected covers that satisfy both sensing coverage and network...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Security for The Credit Card Users Using Machine Learning Technique

    The authors' paper deals with the security for the credit card users in online purchasing. Now-a-days, the credit card usage might be increasing in online and at the same time, the fraudulent activities also increasing. The activity is the hackers trace the credit card numbers through fake websites and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Threat Modelling Using an Attack Surface Metric

    Measurement of software security is a long-standing challenge to the research community. At the same time, practical security metrics and measurements are essential for secure software development. Hence, the need for metrics is more pressing now due to a growing demand for secure software. In this paper, the authors propose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Bandwidth Adaptation Supported Adaptive Call Admission Control Mechanism for 3GPP: LTE Networks

    In this continuous fast world of mobile devices there is always a growing demand of high rate services. So a call has to be continuous with same data rates during a handoff. This paper deals with a novel approach to reduce the call dropping probability while ensuring QoS demands are...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Genetic Algorithm for Optimization of Bloom Filter in Spam Filtering

    Spam is an unsolicited e-mail on the web sent to an outsized range of users. A spam filter is employed to detect the spam mails and to prevent those mails from user's inbox. Bloom filter is used for identifying the spam mails. A Bloom filter is a memory efficient data...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Biometric Authentication Using Fingerprints: A Review

    Biometrics is the science of establishing the identity of an individual based on the physical, chemical or behavioral attributes of the person. The features of fingerprint which can uniquely represent a fingerprint is used for fingerprint recognition. Automatic fingerprint recognition technology has now rapidly grown beyond forensic application and civilian...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A View on Natural Language Processing and Text Summarization

    Text summarization plays an important role in the area of natural language processing and text mining. Text summarization aims to create a compressed summary while retaining the main characteristics of the original set of documents. Many approaches use statistics and machine learning techniques to extract sentences from documents. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Filtering Points Based Skyline Query Processing in Distributed Data Sites

    The skyline query used in a large number of unstructured distributed databases located at different data sites, it extracts the data from, where relevant data are distributed among geographically scattered sites. Constrained skyline query is attached with constraints on specific dimensions. A constraint on a dimension is a range specifying...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Congestion Control in Sensor Networks with Mobile Sink

    The imminent growth of user-centric, pervasive sensing environments promotes sink mobility in an increasing number of event-based, sensor network applications including rescue missions, intrusion detection and smart buildings. In these settings, one of the most critical challenges toward supporting Quality of Service is effective distributed congestion avoidance. Congestion control techniques...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Self Reconfigurale Wirelessmesh Networks

    A multi-hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles and/or applications' bandwidth demands. These failures cause severe performance degradation in WMNs or require expensive manual network management for their real-time recovery. This paper presents an Autonomous network Reconfiguration System (ARS) that enables a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    4G Wireless Communication Using Mobile WIMAX Technology

    WiMAX, meaning Worldwide Interoperability for Microwave Access, is a telecommunications technology that provides wireless transmission of data using a variety of transmission modes, from point-to-point links to portable internet access. The technology provides up to 75 Mbit/s symmetric broadband speed without the need for cables. The technology is based on...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving The QoS Using Deficit Table Scheduler

    A key component for networks with Quality of Service (QoS) support is the egress link scheduling algorithm. An ideal scheduling algorithm implemented in a high-performance network with QoS support should satisfy two main properties: good end-to-end delay and implementation simplicity. Table-based schedulers try to offer a simple implementation and good...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Approach for Implementing Spatial Data in P2P Systems

    Spatial data that identifies the geographic information and boundaries on Earth, such as natural or constructed features, oceans, maps etc. P2P systems provide a distributed platform that is very scalable. Peer-To-Peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. In a computer...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient On-Demand Sleep Wake Protocol in Wireless Sensor Networks

    Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with sleep-wake protocols to ensure both long lived operation and a high degree of security. The authors' contribution in this paper is to address this...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Indoor Environment Monitoring System Based on Embedded System

    Indoor Environment Monitoring System (IEMS) for monitoring the concentrations of indoor air pollutant gases and environmental parameters. The sensor array is implemented using the electrochemical sensors. Interface is implemented using the PIC18F4550 microcontroller, it has less power consumption. Network Capable Application Processor (NCAP) implemented in labview9.0 is based on the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving The Detection of Mobile Replica Nodes Attacks Using Epsilon-Perfect Nash Equilibrium

    The attacker may be able to capture and compromise the mobile nodes, and then use them to inject fake data, disrupt the network operations and eavesdrop on network communications. Detection of replica nodes attacks in infinite duration. And the authors' goal is to detect the fact that both compromised and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Managing Space-Time Heterogeneity for Parallel Structured Adaptive Applications

    Structured Adaptive Mesh Refinement (SAMR) techniques provide an effective means for dynamically concentrating computational effort and resources to appropriate regions in the application domain. However, due to their dynamism and space-time heterogeneity, scalable parallel implementation of SAMR applications remains a challenge. This paper investigates hybrid runtime management strategies and presents...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining Patterns for XML Query Answering Using TAR's

    To extract the information from semistructured documents is a very hard task and is going to become more and more critical as the amount of digital information available on the internet grows. Indeed, documents are often so large that the dataset returned as answer to a query may be too...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Small State and Stretch Efficient Routing for Wireless Networks

    Routing protocols for large wireless networks must address the challenges of reliable packet delivery at increasingly large scales and with highly limited resources. Attempts to reduce routing state can result in undesirable worst-case routing performance, as measured by stretch, which is the ratio of the hop count of the selected...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimized Shortest Path Method for Efficient Data Collection in Wireless Sensor Netwoks

    Sensor nodes in Wireless Sensor Networks are energy-limited. Sensor devices are expected to operate over years with limited power supply. Thus, the energy consumption becomes important compared to throughput, latency. Efficient data collection in Wireless Sensor Networks plays a key role in power conservation. The sink mobility along a constrained...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Handoff in Heterogeneous Wireless Networks Using Vertical Handoff Decision Algorithm

    Among the key issues of Next-Generation Wireless Networks (NGWN), mobility management is one of the most crucial. Because, to providing the seamless connection in the heterogeneous wireless networks, the seamless roaming especially for real time applications is providing is very difficulty. The proliferation of wireless technologies and their ever increasing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design and Implemetation Reconfigurable Processor & Crossbar Switch in Network On Chip for Adaptable On-Chip Topologies

    A Network-on-Chip (NOC) is used in SOC to make interconnection inside. Due to the changing of communication patterns, the aim of this paper is to the design reconfigurable processor and Reconfigurable Crossbar Switch for NOC Routers (RCS-NR) capable of adapting topologies on demand. Due to the dynamic changing of communication...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Test Data Compression for Equal Run Length Coding

    In this paper, test data compression based on Equal Run-Length Coding (ERLC) is presented. It is based on both types of runs of 0's and 1's and explores the relationship between two consecutive runs. This paper also presents a new technique for filling the don't care bits, which is very...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Tracking of Activities in A Smart Environment Using Fuzzy-State Qlearning Algorithm

    The machine learning and pervasive sensing technologies found in smart homes offer unprecedented opportunities for providing health monitoring and assistance to individuals experiencing difficulties living independently at home. In order to monitor the functional health of smart home residents, the authors need to design technologies that recognize and track activities...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Group Communication Using Dynamic Key Allocation Based on Tree Structure

    The goal of the paper is to evaluate trade-off between storage and revocation cost. Storage is computed in terms of keys that each user (respectively, group controller) maintains. And revocation cost is computed in terms of the encryptions performed and the number of messages transmitted, by the group controller. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy for Smart Grid Using Scalable Key Management

    In this paper, the authors focuses on the issues of secure key management for smart grid. With the present key management schemes, it will not yield security for deployment in smart grid. A novel key management scheme is proposed in this paper which merges elliptic curve public key technique and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Traffic Trajectory Analysis Using Router Groups with Optimal Interface Selection Scheme

    Detecting errors in traffic trajectories (i.e., packet forwarding paths) is important to operational networks. Several different traffic monitoring algorithms such as Trajectory Sampling, PSAMP and Fatih can be used for traffic trajectory error detection. However, a straight-forward application of these algorithms will incur the overhead of simultaneously monitoring all network...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralized C# Compiler Using Cloud Computing

    Cloud computing is a model for providing computation, software, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallel to this concept can be drawn with the electricity grid, wherein end-users consume power without needing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Partial Matching Mixed Mode BIST Design for Test Data Reduction

    A mixed-mode Built-In Self-Test (BIST) approach that deploys two new techniques is presented in this paper. Partial pattern matching allows the reduction of the number of patterns used for detecting random pattern resistant faults without relying on fault simulation. A multiple-control sequence is used to guide the Linear Feedback Shift...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Bots With URL Canonicalization in A Log Shipped Data Cleansing Model

    Identifying the seeds and loading the crawl frontier with Data cleansing layer in the backend is the core nature of this paper. An automatic parallel parse using text based web search querying technique on the object identifier will load the database repository with needy data. Repeatable reads on the same...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Pipelined Counter Design Based on State Look Ahead Logic for Future Implementation

    The authors present a parallel counter design that achieves high operating frequencies and consumes less power through a novel pipeline partitioning methodology (a counting path and state look-ahead path), using only three simple repeated CMOS-logic module types: an initial module generates anticipated counting states for higher significant bit modules through...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphicencryption Scheme

    k-anonymization optimization algorithm, serves as a vital privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymization is vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient only but in practice, data sources...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reliable Wireless Communication Architecture for Sensitive Environment

    In wireless network, it is difficult to provide reliability, especially in sensitive environment where interference and intermittent delay in transmission of packets are highly risky. This paper describes an architecture which ensures reliable data and voice communication in a hospital environment. The main requirement is there should not be any...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Small State and Stretch Efficient Routing for Wireless Networks

    Routing protocols for large wireless networks must address the challenges of reliable packet delivery at increasingly large scales and with highly limited resources. Attempts to reduce routing state can result in undesirable worst-case routing performance, as measured by stretch, which is the ratio of the hop count of the selected...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimized Shortest Path Method for Efficient Data Collection in Wireless Sensor Netwoks

    Sensor nodes in Wireless Sensor Networks are energy-limited. Sensor devices are expected to operate over years with limited power supply. Thus, the energy consumption becomes important compared to throughput, latency. Efficient data collection in Wireless Sensor Networks plays a key role in power conservation. The sink mobility along a constrained...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Handoff in Heterogeneous Wireless Networks Using Vertical Handoff Decision Algorithm

    Among the key issues of Next-Generation Wireless Networks (NGWN), mobility management is one of the most crucial. Because, to providing the seamless connection in the heterogeneous wireless networks, the seamless roaming especially for real time applications is providing is very difficulty. The proliferation of wireless technologies and their ever increasing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design and Implemetation Reconfigurable Processor & Crossbar Switch in Network On Chip for Adaptable On-Chip Topologies

    A Network-on-Chip (NOC) is used in SOC to make interconnection inside. Due to the changing of communication patterns, the aim of this paper is to the design reconfigurable processor and Reconfigurable Crossbar Switch for NOC Routers (RCS-NR) capable of adapting topologies on demand. Due to the dynamic changing of communication...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Test Data Compression for Equal Run Length Coding

    In this paper, test data compression based on Equal Run-Length Coding (ERLC) is presented. It is based on both types of runs of 0's and 1's and explores the relationship between two consecutive runs. This paper also presents a new technique for filling the don't care bits, which is very...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Tracking of Activities in A Smart Environment Using Fuzzy-State Qlearning Algorithm

    The machine learning and pervasive sensing technologies found in smart homes offer unprecedented opportunities for providing health monitoring and assistance to individuals experiencing difficulties living independently at home. In order to monitor the functional health of smart home residents, the authors need to design technologies that recognize and track activities...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Group Communication Using Dynamic Key Allocation Based on Tree Structure

    The goal of the paper is to evaluate trade-off between storage and revocation cost. Storage is computed in terms of keys that each user (respectively, group controller) maintains. And revocation cost is computed in terms of the encryptions performed and the number of messages transmitted, by the group controller. The...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Security and Privacy for Smart Grid Using Scalable Key Management

    In this paper, the authors focuses on the issues of secure key management for smart grid. With the present key management schemes, it will not yield security for deployment in smart grid. A novel key management scheme is proposed in this paper which merges elliptic curve public key technique and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Traffic Trajectory Analysis Using Router Groups with Optimal Interface Selection Scheme

    Detecting errors in traffic trajectories (i.e., packet forwarding paths) is important to operational networks. Several different traffic monitoring algorithms such as Trajectory Sampling, PSAMP and Fatih can be used for traffic trajectory error detection. However, a straight-forward application of these algorithms will incur the overhead of simultaneously monitoring all network...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Centralized C# Compiler Using Cloud Computing

    Cloud computing is a model for providing computation, software, data access and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallel to this concept can be drawn with the electricity grid, wherein end-users consume power without needing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Partial Matching Mixed Mode BIST Design for Test Data Reduction

    A mixed-mode Built-In Self-Test (BIST) approach that deploys two new techniques is presented in this paper. Partial pattern matching allows the reduction of the number of patterns used for detecting random pattern resistant faults without relying on fault simulation. A multiple-control sequence is used to guide the Linear Feedback Shift...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Bots With URL Canonicalization in A Log Shipped Data Cleansing Model

    Identifying the seeds and loading the crawl frontier with Data cleansing layer in the backend is the core nature of this paper. An automatic parallel parse using text based web search querying technique on the object identifier will load the database repository with needy data. Repeatable reads on the same...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Pipelined Counter Design Based on State Look Ahead Logic for Future Implementation

    The authors present a parallel counter design that achieves high operating frequencies and consumes less power through a novel pipeline partitioning methodology (a counting path and state look-ahead path), using only three simple repeated CMOS-logic module types: an initial module generates anticipated counting states for higher significant bit modules through...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Anonymization of Continuously Disseminating Database Using Product Homomorphicencryption Scheme

    k-anonymization optimization algorithm, serves as a vital privacy protection mechanism in data privacy reservation. Apart from homogeneity background knowledge attacks to which k-anonymization is vulnerable to, it considers only single static release, thereby protecting data up to the first release or the first recipient only but in practice, data sources...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Detection of Spam Messages Using High Level Abstraction Techniques

    Spam is a key problem in electronic communication, including large-scale email systems and the growing number of blogs. Recent work in P2P overlay networks allow for Decentralized Object Location and Routing (DOLR) across networks based on unique IDs. In this paper, the authors propose an extension to DOLR systems to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Session Passwords Using Hybrid Authentication Scheme

    Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals and other business settings, where they...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Extraction of Margin Results Using Feedback Learning Techniques & Ontologies

    As the sheer volume of new knowledge increases, there is a need to find effective ways to convey and correlate emerging knowledge in machine-readable form. The success of the semantic web hinges on the ability to formalize distributed knowledge in terms of a varied set of ontologies. The authors present...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Creation of Monitoring Network Using Different Communication Patterns

    Numerous attacks, such as worms, phishing and botnets, threaten the availability of the Internet, the integrity of its hosts and the privacy of its users. A core element of defense against these attacks is Anti-Virus (AV) - a service that detects, removes and characterizes these threats. The ability of these...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Perfect Packets Reordering Generation Using High Index Degree Nodes Connectivity

    Workload distribution is critical to the performance of network processor based parallel forwarding systems. Scheduling schemes that operate at the packet level, e.g., round-robin cannot preserve packet-ordering within individual TCP connections. Dynamic load balancing is a popular recent technique that protects ISP networks from sudden congestion caused by load spikes...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Update The Sensitive Values in Database Using i-Diversity Slicing Techniques

    The authors consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has many applications for online collaboration. They present protocols, based on the use of homomorphism encryption and balanced hashing, for both...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Efficient Encryption Schemes Generation Using Mapping Matrix Multiplication

    Large-scale problems in the physical and life sciences are being revolutionized by Internet computing technologies, like grid computing, that make possible the massive cooperative sharing of computational power, bandwidth, storage and data. The authors address the problem of using untrusted (potentially malicious) cryptographic helpers. They provide a formal security definition...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Certificate Revocation in Mobile Ad-Hoc Networks

    The wireless and dynamic nature of Mobile Ad-hoc NETworks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the network layer more prone to security attacks. Ad hoc networks are a new wireless networking...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Profile and Threshold Based Procedures for Accurate Detection of DDoS Attacks

    The authors describe Bro, a stand-alone system for detecting network intruders in real-time by passively monitoring a network link over which the intruder's traffic transits. They give an overview of the system's design, which emphasizes high speed (FDDI-rate) monitoring, realtime notification, clear separation between mechanism and policy, and extensibility. To...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Designing an Internet Integrated Security Gateways in Embedded Systems

    The ISG series Integrated Security Gateways are firewall/VPN-based systems that deliver security features such as Intrusion Prevention System (IPS), Antispam, Web Filtering, and Internet Content Adaptation Protocol (ICAP) antivirus redirection support. The advanced system is further expandable with optionally integrated Intrusion Detection and Prevention (IDP) or as a General Packet...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Comparative Analysis Packets Classification Techniques for Target Sensor Network Transmission

    Network wide broadcasting in Mobile Ad-hoc NETworks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a single methodology that efficiently delivers a packet from...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Perfect Maximization of Transmission Content Using Utility Function

    The authors study the degraded compound multi-receiver wiretap channel, which consists of two groups of users and a group of eavesdroppers. They consider two different communication scenarios. In both scenarios, the transmitter sends two confidential messages, one for each group of users. In the first scenario, both messages need to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Selection of Architecture Styles Using Analytic Network Process

    Selection of software architecture for any system is a difficult task as many different stake holders are involved in the selection process. The continuing process of software systems enlargement in size and complexity becomes system design extremely important for software production. It serves as an evaluation and implementation plan for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Using Interpreter Extract The Symbolic Bugs Identification

    Web sites are becoming increasingly complex as more and more services and information are made available over the Internet and intranets. At the same time, the correct behavior of sites has become crucial to the success of businesses and organizations and thus should be tested thoroughly and frequently. This paper...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Network Attack Detection Off/Online Alert Aggregation with Probabilistic Data Stream Approach

    Network traffic faces number of challenges: an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, the authors address these three issues network attack identification, online or offline alert aggregation and probabilistic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Novel Optimal Routing in Multi-Hop Wireless Networks Using Bellmanford Algorithm

    Multi-hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others' data packets. The idea of multi-hop wireless networking is sometimes also called infrastructure-less networking, since...

    Provided By International Journal of Communications and Engineering

  • White Papers // Sep 2012

    Privacy Preserving Scheme for Detecting Sybil Attacks in VANET

    Vehicular Ad-hoc NETworks (VANETs) are being advocated as a means to increase road safety and driving comfort, as well as to facilitate traffic control and management of parking lots and public areas. When designing a cooperation-based system, it is important to address security and privacy concerns. The system needs to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Reliable Wireless Communication Architecture for Sensitive Environment

    In wireless network, it is difficult to provide reliability, especially in sensitive environment where interference and intermittent delay in transmission of packets are highly risky. This paper describes an architecture which ensures reliable data and voice communication in a hospital environment. The main requirement is there should not be any...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximum Flow Minimum Cut Multi-Access Channel for Optimized Throughput and Life Time in Wireless Networks

    A generalized model for the throughput optimization has the capability of multi packet reception in wireless networks which consists of one or more transmit antennas. The joint routing and scheduling problem NP-hard is identified by finding cardinality of the maximum independent set of graph which is equivalent to finding the...

    Provided By International Journal of Communications and Engineering