International Journal of Communications and Engineering

Displaying 281-320 of 349 results

  • White Papers // Mar 2012

    VLSI Based High-Throughput Multistandard Convolutional Turbo Scalable Map Processor Design

    Most of advanced wireless standards, such as WiMAX and LTE, have adopted different Convolutional Turbo Code (CTC) schemes with various block sizes and throughput rates. Thus, a reconfigurable and scalable hardware accelerator for multi standard CTC decoding is necessary. In this paper, the authors propose scalable Maximum A Posteriori algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Applying Data Mining Techniques in Genetic Fuzzy Systems Rules To Network Intrusion Detection

    In this paper, the authors present how Data Mining discovers and extracts useful patterns from this large data to find observable patterns. The paper demonstrates the ability of Data Mining in improving the quality of decision making process in pharm industry. However, as they progress into a more integrated world...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Vehicle Theft Prevention and Location Finding System Using Face Detection Based on Image Processing

    The evident fact in the world is that the number of vehicles particularly cars and other automobiles escalating in terms of invention as well as theft attempts. Even though a lot of global and other manufacturing industry did lot of efforts to invent vehicle security system particularly for cars, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Bandwidth Efficient and Privacy-Aware Mobile Applications in Android

    Collaborative applications running on 3G devices often rely on cloud-based servers for computation and storage. A peer-to-peer approach to building these applications can provide benefits such as enhanced privacy and bandwidth efficiency. The authors propose a system which is based on asynchronous network architecture that uses the cloud to relay...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Co-Operative Spectrum Sensing Using Wavelet Transform

    In cognitive radio networks, spectrum sensing is a crucial component in the discovery of spectrum opportunities for secondary systems (or unlicensed systems). Cognitive radio is used to allow the unlicensed user to use the band of primary user. Cognitive radio is used to solve spectrum scarcity and spectrum underutilization problem....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    System Security Using Keystroke Analysis

    Security is the most important concern now-a-days. Now the authors' education system improves, by the way intruders also increase. To protect users system from them, they need to improve security. When users leave the system alive without log off, at the time some intruders enter their system and may misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Bit Stream Compression Using Golomb Coding In FPGA

    Field-Programmable Gate Array (FPGA) is widely used in reconfigurable systems. Since the configuration information for FPGA has to be stored in internal or external memory as bit streams, the limited memory size and access bandwidth become the key factors in determining the different functionalities that a system can be configured...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting Fault Localization By Giving Different Test Cases For The Code

    Localizing the fault is complex while executing the program. The authors proposed a technique code coverage, statement coverage based fault localization. In this, programmers identify and repair faulty code more effectively and efficiently. In this paper, they also report on experiments performed on the "Siemen Test Suite". By the code...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Range and Location Based Privacy Aware Monitoring For Dynamic Objects

    Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a Privacy-Aware Monitoring (PAM) framework that addresses both issues. The framework distinguishes itself from the existing work by being the first to holistically address the issues of location updating in terms of monitoring accuracy, efficiency and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ranking and Optimising Web Services in Semantic Dimension Using PSO Algorithm

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To address QoS-aware semantic web...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Wi-Fi Tehnology and its Trends in IT

    There are many trends in users IT industry. Here the authors are going to discuss about the emerging technology in IT (i.e.) Wi-Fi technology. Wi-Fi (Wireless Fidelity) is a way to connect to the internet without any wires or cumbersome cables. Wi-Fi technology uses a radio technology called 802.11b for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Framework For Accountability and Trust in Cloud Computing

    Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. In this paper, the authors ensure the trust in cloud computing by enabling Public...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Feature Reduction Technique For Large Scale Text Data

    The text data dimension reduction plays an important role in the present day mining of text data and information retrieval. Dimensionality reduction algorithms are generally designed for feature extraction or feature selection. The authors' paper feature-selection algorithm can achieve the optimal solution according to its objective function. In this paper,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Business Model For Cloud Computing with Caching Notion

    In this paper, the authors propose a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext and the party responsible for data encryption and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Security and Performance Outsourcing Over Cloud Computing Using Linear Programming

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adhoc Network Security Using Dynamic IP Configuration

    In MANETs, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In the authors' paper, they present an ID based dynamic IP configuration scheme that can securely allocate IP addresses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Third Party Auditing For Dynamic Data

    In cloud storage system, the client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. Existing protocols support both features with the help...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preservation Against Traffic Analysis Using Random Network Coding in Multi-Hop Wireless Networks

    In multi-hop wireless networks, privacy threat is one of the critical issues, where attacks such as traffic analysis can be easily launched by a malicious adversary due to the open-air transmission. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ontology Based Semantic Annotation Framework

    In this paper, the authors present a semantic annotation framework that is capable of extracting appropriate information from unstructured, ungrammatical and unintelligible data sources. The framework, named BNOSA, uses ontology to conceptualize a problem domain and to extract data from the given corpora and Bayesian networks to resolve conflicts and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy Based IP Traceback Against DDOS Attacks

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory-less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Connectivity at Failures By ISPs with Minimum Cost

    Often users face risk of failures on many links or routers in Internet for various reasons, such as fiber cuts, failure of transmission devices, misconfiguration of routers and overloading of routers. Internet is required to be robust enough to sustain connectivity between nodes and maintain stable services in the event...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Competent Communication for Time-Critical Applications in Sunken Sensor Networks

    The main features of acoustic channels are long propagation delay and high error probability. So, it is very challenging to provide energy-efficient reliable data transfer for time critical applications such as pollution monitoring and submarine detection. In traditional retransmission upon failure, very large end-to-end delay occurs and therefore it is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Virtual Systems Workload Characterization

    Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single workload benchmark is useful in quantifying the virtualization overhead within a single VM, but not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Data Retrieval Clustering Based Anomaly Intrusion Detection System in Mining Process With Time Prediction

    A network intrusion is any type of attack or malicious activity that can compromise the stability or security of a network environment. Intruders can be classified in two groups. External intruders don't have authorized access to the system or network they attack, while internal intruders have some authority access to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Conflict-Free Transmission With Dynamic Scheduling for Sensor Network Queries

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Privacy and Authorization in Grid Using Advanced Encryption Standard

    The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Microprocessor Cache Compression by Cellular Automata P-Match to Increase the Cache Capacity

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multiprocessors are used in the system design, more processors require more accesses to memory. Thus raising a, 'Wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip cache, two...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Methods for Handling Uncertainty in Decision Support System

    Data uncertainty is common in real world applications due to various causes, including imprecise measurements, network latency, out dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. In this paper, the authors are describing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

    The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Update for Anonymous Database

    Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process. Privacy preservation is applied to protect individual private information. Statistical and Anonymization...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Feature Set Based Classification Scheme Under Data Streams

    Classification techniques are used to identify the class labels for the transactions. The classification operations are applied on the database transactions. Data streams are one of the major data source for many applications. The data values are collected from one or more sources. The data stream classification is a complex...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

    Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for Parallel Data Processing in Cloud Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation Of Multipath Routing And Max-Min Fair Qos Provisioning In Distributed Systems

    Main aim of the author's paper is to send and receive packets without any problems such as hacking, congestion, traffic, overloading etc., There are many techniques were introduced to avoid these above problems; in this paper, in existing system he introduced mix networks to avoid congestion problem. The major disadvantage...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Document Clustering with Semantic Analysis Using Parallel Spectral Method

    Text documents are one of the unstructured data models that represents the information. Clustering techniques are used to group the documents based on the similarity. Parallel spectral clustering algorithm is used to cluster large data collections. Dense similarity matrix approximation is applied to reduce memory usage. Parallel spectral clustering algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing In Delay Tolerant Networks Using Minimum Distance Packet Forwarding

    Delay tolerant networks have intermittent connectivity between their nodes. There is no stable end-to-end connectivity from source to destination because the future node connections are mostly unknown. In these networks, opportunistic forwarding technique is used to deliver the message. By observing human mobility traces the conditional intermeeting time is used...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A QoS-Aware Team Multicast Routing Protocol For Mobile Ad Hoc Networks

    Team multicast identifies clusters of nodes with same affinity as teams and manages the multicast membership information using the unit of team rather than dealing with individual node members. The source propagates a data packet to each subscribed team's leader and each leader forwards the data to the entire team....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Signal Efficient Secure Network Mobility

    In ad hoc network security is an important one. When an entire network move from one network to another is called NEtwork Mobility (NEMO). Mobile Virtual Private Network (VPN) is used to secure data transmission between unreliable external network and protected private internal network .The VPN support NEMO is called...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ensuring the Integrity of Data Storage Security and Multiple Auditing Using Tpa in Cloud Computing

    In this paper proposed a problem of ensuring the integrity of data storage in Cloud Computing. In particular, the authors consider the task of allowing a Third Party Auditor (TPA), on behalf of the cloud client, to verify the integrity of the dynamic data stored in the cloud. The introduction...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Study on Behavioural Pattern of Students in Educational Environment

    The path for the students must be traced efficiently in educational environment and this becomes the greatest difficulty. For example, institutions must know a student's choice to enroll in particular course, and the number of students must be concentrated in order to excel in their studies. The most efficient and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Applying Data Mining Techniques in Genetic Fuzzy Systems Rules To Network Intrusion Detection

    In this paper, the authors present how Data Mining discovers and extracts useful patterns from this large data to find observable patterns. The paper demonstrates the ability of Data Mining in improving the quality of decision making process in pharm industry. However, as they progress into a more integrated world...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Intelligent Vehicle Theft Prevention and Location Finding System Using Face Detection Based on Image Processing

    The evident fact in the world is that the number of vehicles particularly cars and other automobiles escalating in terms of invention as well as theft attempts. Even though a lot of global and other manufacturing industry did lot of efforts to invent vehicle security system particularly for cars, the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Bandwidth Efficient and Privacy-Aware Mobile Applications in Android

    Collaborative applications running on 3G devices often rely on cloud-based servers for computation and storage. A peer-to-peer approach to building these applications can provide benefits such as enhanced privacy and bandwidth efficiency. The authors propose a system which is based on asynchronous network architecture that uses the cloud to relay...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Parallel Co-Operative Spectrum Sensing Using Wavelet Transform

    In cognitive radio networks, spectrum sensing is a crucial component in the discovery of spectrum opportunities for secondary systems (or unlicensed systems). Cognitive radio is used to allow the unlicensed user to use the band of primary user. Cognitive radio is used to solve spectrum scarcity and spectrum underutilization problem....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    System Security Using Keystroke Analysis

    Security is the most important concern now-a-days. Now the authors' education system improves, by the way intruders also increase. To protect users system from them, they need to improve security. When users leave the system alive without log off, at the time some intruders enter their system and may misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Bit Stream Compression Using Golomb Coding In FPGA

    Field-Programmable Gate Array (FPGA) is widely used in reconfigurable systems. Since the configuration information for FPGA has to be stored in internal or external memory as bit streams, the limited memory size and access bandwidth become the key factors in determining the different functionalities that a system can be configured...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Detecting Fault Localization By Giving Different Test Cases For The Code

    Localizing the fault is complex while executing the program. The authors proposed a technique code coverage, statement coverage based fault localization. In this, programmers identify and repair faulty code more effectively and efficiently. In this paper, they also report on experiments performed on the "Siemen Test Suite". By the code...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Range and Location Based Privacy Aware Monitoring For Dynamic Objects

    Efficiency and privacy are two fundamental issues in moving object monitoring. This paper proposes a Privacy-Aware Monitoring (PAM) framework that addresses both issues. The framework distinguishes itself from the existing work by being the first to holistically address the issues of location updating in terms of monitoring accuracy, efficiency and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ranking and Optimising Web Services in Semantic Dimension Using PSO Algorithm

    Ranking and optimization of web service compositions represent challenging areas of research with significant implications for the realization of the "Web of services" vision. "Semantic web services" use formal semantic descriptions of web service functionality and interface to enable automated reasoning over web service compositions. To address QoS-aware semantic web...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Wi-Fi Tehnology and its Trends in IT

    There are many trends in users IT industry. Here the authors are going to discuss about the emerging technology in IT (i.e.) Wi-Fi technology. Wi-Fi (Wireless Fidelity) is a way to connect to the internet without any wires or cumbersome cables. Wi-Fi technology uses a radio technology called 802.11b for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Framework For Accountability and Trust in Cloud Computing

    Cloud computing is a marketing term for technologies that provide computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. In this paper, the authors ensure the trust in cloud computing by enabling Public...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Feature Reduction Technique For Large Scale Text Data

    The text data dimension reduction plays an important role in the present day mining of text data and information retrieval. Dimensionality reduction algorithms are generally designed for feature extraction or feature selection. The authors' paper feature-selection algorithm can achieve the optimal solution according to its objective function. In this paper,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Business Model For Cloud Computing with Caching Notion

    In this paper, the authors propose a business model for cloud computing based on the concept of separating the encryption and decryption service from the storage service. Furthermore, the party responsible for the data storage system must not store data in plaintext and the party responsible for data encryption and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Security and Performance Outsourcing Over Cloud Computing Using Linear Programming

    Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Adhoc Network Security Using Dynamic IP Configuration

    In MANETs, most of the approaches rely on broadcasting for address solicitation and/or duplicate address detection. As a result, several types of security threats in dynamic IP configuration can be observed. In the authors' paper, they present an ID based dynamic IP configuration scheme that can securely allocate IP addresses...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preserving Third Party Auditing For Dynamic Data

    In cloud storage system, the client stores their data in the server without keeping a local copy. Hence, it is of critical importance that the client should be able to verify the integrity of the data stored in the remote un-trusted server. Existing protocols support both features with the help...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Privacy Preservation Against Traffic Analysis Using Random Network Coding in Multi-Hop Wireless Networks

    In multi-hop wireless networks, privacy threat is one of the critical issues, where attacks such as traffic analysis can be easily launched by a malicious adversary due to the open-air transmission. Network coding has the potential to thwart traffic analysis attacks since the coding/mixing operation is encouraged at intermediate nodes....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ontology Based Semantic Annotation Framework

    In this paper, the authors present a semantic annotation framework that is capable of extracting appropriate information from unstructured, ungrammatical and unintelligible data sources. The framework, named BNOSA, uses ontology to conceptualize a problem domain and to extract data from the given corpora and Bayesian networks to resolve conflicts and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Entropy Based IP Traceback Against DDOS Attacks

    Distributed Denial-of-Service (DDoS) attacks are a critical threat to the Internet. However, the memory-less feature of the Internet routing mechanisms makes it extremely hard to trace back to the source of these attacks. As a result, there is no effective and efficient method to deal with this issue so far....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Connectivity at Failures By ISPs with Minimum Cost

    Often users face risk of failures on many links or routers in Internet for various reasons, such as fiber cuts, failure of transmission devices, misconfiguration of routers and overloading of routers. Internet is required to be robust enough to sustain connectivity between nodes and maintain stable services in the event...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A High-Quality Secured Shell for Location Monitoring System in Wireless Sensor Networks

    Advances in sensor networking and location tracking technology enable location based applications but they also create significant privacy risk. Tracking users personal information in an untrusted environment poses privacy breach. In order to preserve the privacy, a high quality location monitoring services for system users needed. Hence two in-network location...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Competent Communication for Time-Critical Applications in Sunken Sensor Networks

    The main features of acoustic channels are long propagation delay and high error probability. So, it is very challenging to provide energy-efficient reliable data transfer for time critical applications such as pollution monitoring and submarine detection. In traditional retransmission upon failure, very large end-to-end delay occurs and therefore it is...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Virtual Systems Workload Characterization

    Virtual systems and virtualization technology are taking the momentum nowadays in data centers and IT infrastructure models. Performance analysis of such systems is very invaluable for enterprises but yet is not a deterministic process. Single workload benchmark is useful in quantifying the virtualization overhead within a single VM, but not...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Data Retrieval Clustering Based Anomaly Intrusion Detection System in Mining Process With Time Prediction

    A network intrusion is any type of attack or malicious activity that can compromise the stability or security of a network environment. Intruders can be classified in two groups. External intruders don't have authorized access to the system or network they attack, while internal intruders have some authority access to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Conflict-Free Transmission With Dynamic Scheduling for Sensor Network Queries

    With the emergence of high data rate sensor network applications, there is an increasing demand for high-performance query services. To meet this challenge, the authors propose Dynamic Conflict-free Query Scheduling (DCQS), a novel scheduling technique for queries in wireless sensor networks. In contrast to earlier TDMA protocols designed for general-purpose...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Providing Privacy and Authorization in Grid Using Advanced Encryption Standard

    The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Microprocessor Cache Compression by Cellular Automata P-Match to Increase the Cache Capacity

    Microprocessors speeds have been increasing faster than speed of off-chip memory. When multiprocessors are used in the system design, more processors require more accesses to memory. Thus raising a, 'Wall' between processor and memory. Accessing off-chip memory takes an order of magnitude more time than accessing an on-chip cache, two...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Methods for Handling Uncertainty in Decision Support System

    Data uncertainty is common in real world applications due to various causes, including imprecise measurements, network latency, out dated sources and sampling errors. These kinds of uncertainty have to be handled cautiously, or else the mining results could be unreliable or even wrong. In this paper, the authors are describing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Secure Collaborative Network Using Up Up Key Stroke Latency Algorithm

    The keystroke patterns produced during typing is found to be unique for every individual, just like handwritten text. Therefore, these keystroke patterns can be used as a biometric data to authenticate a user over the internet. In particular, keystroke recognition can enhance the username and password security model by monitoring...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Update for Anonymous Database

    Census data and medical data are referred as micro data. Data publish schemes are used to provide private data for analysis. Privacy preservation is used to protect private data values. Anonymity is considered in the privacy preservation process. Privacy preservation is applied to protect individual private information. Statistical and Anonymization...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Feature Set Based Classification Scheme Under Data Streams

    Classification techniques are used to identify the class labels for the transactions. The classification operations are applied on the database transactions. Data streams are one of the major data source for many applications. The data values are collected from one or more sources. The data stream classification is a complex...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Flow Watermarking Technique for Encrypted Attack Traffic

    Digital watermarking techniques are used for authentication. Embedding and decoding tasks are performed in the watermarking. The watermark embedding process embeds the watermark bits into the carrier signal. Watermark decoder process detects and extracts any watermark bits from the carrier signal. Attack packets are passed through a set of intermediate...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Frame Work for Parallel Data Processing in Cloud Computing

    Cloud computing is clearly one of today's most enticing technology areas due, at least in part, to its cost-efficiency and flexibility. However, despite the surge in activity and interest, there are significant, persistent concerns about cloud computing that are impeding momentum and will eventually compromise the vision of cloud computing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Implementation Of Multipath Routing And Max-Min Fair Qos Provisioning In Distributed Systems

    Main aim of the author's paper is to send and receive packets without any problems such as hacking, congestion, traffic, overloading etc., There are many techniques were introduced to avoid these above problems; in this paper, in existing system he introduced mix networks to avoid congestion problem. The major disadvantage...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Document Clustering with Semantic Analysis Using Parallel Spectral Method

    Text documents are one of the unstructured data models that represents the information. Clustering techniques are used to group the documents based on the similarity. Parallel spectral clustering algorithm is used to cluster large data collections. Dense similarity matrix approximation is applied to reduce memory usage. Parallel spectral clustering algorithm...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing In Delay Tolerant Networks Using Minimum Distance Packet Forwarding

    Delay tolerant networks have intermittent connectivity between their nodes. There is no stable end-to-end connectivity from source to destination because the future node connections are mostly unknown. In these networks, opportunistic forwarding technique is used to deliver the message. By observing human mobility traces the conditional intermeeting time is used...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A QoS-Aware Team Multicast Routing Protocol For Mobile Ad Hoc Networks

    Team multicast identifies clusters of nodes with same affinity as teams and manages the multicast membership information using the unit of team rather than dealing with individual node members. The source propagates a data packet to each subscribed team's leader and each leader forwards the data to the entire team....

    Provided By International Journal of Communications and Engineering