International Journal of Communications and Engineering

Displaying 321-349 of 349 results

  • White Papers // Mar 2012

    A Novel Approach to Edge Detection Using Wavelet Transform and Fuzzy Rules

    Edge detection is one of the preprocessing steps in image processing and computer vision applications, particularly in the area of object segmentation. It plays a vital role in image analysis and it is a key of solving many complex problems. Despite many existing traditional edge operators, which are based on...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Multicast Routing in MANETs

    Multiple-path source routing protocols allow a data source node to distribute the total traffic among available paths. In this paper, the authors consider the problem of jamming-aware source routing in which the source node performs traffic allocation based on empirical jamming statistics at individual network nodes. They formulate this traffic...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    IPv6 in Visual Sensor Network

    Visual sensor network is one of the emerging technologies which will have impact on users' daily life in near future. These wireless sensor nodes are expected to vastly out number conventional computer hosts as the authors see them today, but their strict resource constraints are unlike other technologies already common...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    EFDCB Algorithm Based QoS Routing in MANET

    A set of attributes related to the performance of the connection for each communication user can request a particular attribute each service is associated with a set of attributes. To find a feasible path between source and destination this satisfies the QoS requirements. The problem of routing based on a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Advanced RF/Baseband Interconnect Schemes for Inter- and Intra-ULSI Communications

    Future inter- and intra-ULSI interconnect systems demand extremely high data rates (up to 100 Gbps/pin or 20-Tbps aggregate) as well as bidirectional multi-I/O concurrent service, reconfigurable computing/processing architecture and total compatibility with mainstream silicon system-on-chip and system-in-package technologies. In this paper, the authors review recent advances in interconnect schemes that...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Circulated Client-Assisted Control Mission Optimization for Ungainly WLAN

    IEEE 802.11 WLANs are becoming more and more popular in homes and urban areas. As compared to traditional WLAN setups (such as in campuses) where knowledgeable network administrators can make centralized decisions on channel selection, Access Points (APs) in these networks are often deployed by network non-specialists in an uncoordinated...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    User Based Record Retrieval for Text Classification

    Feature selection is an important preprocessing step for problems of high dimension such as text categorization. Text categorization is a fundamental technique to mine massive amount of textual data. The problem is of high dimension and most of the machine learning algorithms does not perform well with all the terms...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Constraint Based Record Matching

    Record matching, which identifies the records that represents the same real world entity is an important step for data integration. Most state-of-the-art record matching methods are supervised including the UDD which is termed and expected to be unsupervised. In web database scenario, the records to be matched are query results,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Scheduling and Security Mechanism for Multi Dimensional Resource Environment

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Resources are allocated for the dependant and independent tasks. Processor and memory are shared with the nodes under heterogeneous distributed system environment. Scheduling schemes are used for the resource allocation process. Heterogeneous...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    AP Centric and Deputy Forward Method for Location Oriented Content Delivery

    In this paper, a delay-sensitive service is introduced that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of Access Points (APs) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably introduce...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Network Intrusion Detection Using Enhanced Adaboost Algorithm

    Network intrusion detection is a way to separate normal behaviors from the attacked ones. An Intrusion Detection System (IDS) gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions which are attacks from outside the organization and misuse...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Processing and Analysis of Satellite Images To Detect Vegetation

    Satellite images have many applications like meterology, agriculture, geology, forestry, landscape warfare etc. Interpretation and analysis of satellite imagery is conducted using specialized remote sensing applications. In this paper, the authors have developed a technique which tries to extract useful information from large set of satellite images. They consider time...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Machine Learning Strategy for Throughput Improvement in Grid Computing

    Resource allocation and job scheduling are the core functions of grid computing. These functions are based on adequate information of available resources. Grid resource monitoring and grid resource prediction are the two mechanisms used. Grid resource state monitoring cares about the running state, distribution, load and malfunction of resources in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Throughput Optimization Using Parallelism and Packet Loss Recovery in WAN

    Using multiple parallel streams for wide area data transfers may yield much better performance than using a single stream, but overwhelming the network by opening too many streams may have an inverse effect. The congestion created by excess number of streams may cause a drop down in the throughput achieved....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Analysis of Optical Network with Soliton Propagation in DCF and EDFA Based Network

    The advancement in optical communication by the emergence of soliton pulse propagation with its distinct feature of retaining its shape through long distance transmission, have brought in lot of interest and applications in the field of optics. The hurdle to major advancement was the usage of expensive regenerators which has...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Analysis Attack On Elliptic Curve'S Point Multiplication

    Information is becoming a crucial if not the most important resource of the economy and the society at large. Information can be copied without cost, it can be communicated at the speed of light and it can be destroyed without leaving traces. This poses new challenges for the protection of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancing Security and Privacy in Biometric Cryptosystems for Trusted Authentication

    In this paper, the authors introduces a novel fingerprint matching algorithm using both ridge features and the conventional minutiae features to increase the recognition performance against non-linear deformation in fingerprints. The proposed ridge features are composed of four elements: ridge count, ridge length, ridge curvature direction and ridge type. These...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Study On XML Based Context-Driven Search Engine for Web Data Mining

    There is an ever-growing availability of semi structured information on the Web and in digital libraries. Increasingly, users, both expert and non expert, have access to text documents equipped with some semantic hints through XML markup. Loosely structured querying allows combining some structural constraints within a Keyword query by specifying...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Replication in Binary Tree Based Peer-To-Peer Network

    Distributed Hash Tables (DHTs) share storage and routing responsibility among all nodes in a peer-to-peer network. These networks have bounded path length unlike unstructured networks. Unfortunately, nodes can deny access to keys or misroute lookups. The authors address both of these problems through replica placement. They characterize binary tree-based routing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Geographic Routing with Local Face Information without Planarization

    Geographic routing also called position-based routing is mainly proposed for wireless networks and based on the idea that the source sends a message to the geographic location of the destination instead of using the network address. The paper designs new geographic routing algorithms, namely Greedy Distributed Spanning Tree Routing (GDSTR)...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mobility and Traffic Model Data Dissemination in Vehicular Networks

    Vehicular networks have great interest in the research community and multihop data dissemination has become an important issue. Vehicular adhoc network is a type of mobile adhoc network, in which mobile nodes forming temporary or short lived network without any fixed infrastructure. This paper proposed the concept of data dissemination...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Integrated Resource Allocation and Trust Model for Heterogeneous Distributed Systems

    High speed networks are used to connect heterogeneous systems. Different resource levels are used in heterogeneous distributed systems. Resources are allocated for the dependant and independent tasks. Processor and memory are shared with the nodes under heterogeneous distributed system environment. Scheduling schemes are used for the resource allocation process. Heterogeneous...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    An Approach for Specifying The Quality Requirements of Software Architecture

    It is of general agreement that quality issues should be considered very early in the software development process to mitigate risks and to facilitate the achievement of the overall software system. Moreover, the architecture of the system drives the whole development process. The fulfillment of nonfunctional quality requirements by a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Developing an Efficient Software Architecture Design Using Simulated Annealing Based on Non Functional Requirements

    software system and selection of the structural elements and their interfaces by which the system is composed together. Software architecture, along with the structure and behavior, also concerned with non Functionality, performance, reuse, economic and technological constraints etc. In software, its components are related to one another in large variety...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Software Testing Analysis

    A key issue in software testing is the actual generation of test data from program input domain. Obviously, more accurate input domain is, more efficient test generation is. This paper presents a path-oriented automatic random testing method based on double constraint propagation. For a given path, its domain can be...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Evaluation of Routing Protocols in Manet Using QualNet 5.0

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile node without any infrastructure. Routing is problem in MANET. There are many protocols which are developed in this field but still it is difficult to decide which one is best suitable for MANET. In this paper, the authors present evaluation...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Adaptive Fault Tolerant QoS Control Algorithms for Maximizing System Lifetimeof Query-Based Wireless Sensor Networks

    These data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expect a response to be returned within the deadline. While the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    SVM & Decision Trees for High Attack Detection Ratio

    Intrusion detection systems were used in the past along with various techniques to detect intrusions in networks effectively. However, most of these systems are able to detect the intruders only with high false alarm rate. In this paper, the authors propose a new intelligent agent-based intrusion detection model for Mobile...

    Provided By International Journal of Communications and Engineering

  • White Papers // Nov 2012

    Fine Gained Information Exaction Producer Using Decentralized P2P Networks

    As the use of peer-To-Peer (P2P) services for distributed file sharing has grown, the need for Fine-Grained Access Control (FGAC) has emerged. Existing access control framework use an all or nothing approach that is inadequate for sensitive content that may be shared by multiple users. In this paper, the authors...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving The QoS Using Deficit Table Scheduler

    A key component for networks with Quality of Service (QoS) support is the egress link scheduling algorithm. An ideal scheduling algorithm implemented in a high-performance network with QoS support should satisfy two main properties: good end-to-end delay and implementation simplicity. Table-based schedulers try to offer a simple implementation and good...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Approach for Implementing Spatial Data in P2P Systems

    Spatial data that identifies the geographic information and boundaries on Earth, such as natural or constructed features, oceans, maps etc. P2P systems provide a distributed platform that is very scalable. Peer-To-Peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. In a computer...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient On-Demand Sleep Wake Protocol in Wireless Sensor Networks

    Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with sleep-wake protocols to ensure both long lived operation and a high degree of security. The authors' contribution in this paper is to address this...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Indoor Environment Monitoring System Based on Embedded System

    Indoor Environment Monitoring System (IEMS) for monitoring the concentrations of indoor air pollutant gases and environmental parameters. The sensor array is implemented using the electrochemical sensors. Interface is implemented using the PIC18F4550 microcontroller, it has less power consumption. Network Capable Application Processor (NCAP) implemented in labview9.0 is based on the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving The Detection of Mobile Replica Nodes Attacks Using Epsilon-Perfect Nash Equilibrium

    The attacker may be able to capture and compromise the mobile nodes, and then use them to inject fake data, disrupt the network operations and eavesdrop on network communications. Detection of replica nodes attacks in infinite duration. And the authors' goal is to detect the fact that both compromised and...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Managing Space-Time Heterogeneity for Parallel Structured Adaptive Applications

    Structured Adaptive Mesh Refinement (SAMR) techniques provide an effective means for dynamically concentrating computational effort and resources to appropriate regions in the application domain. However, due to their dynamism and space-time heterogeneity, scalable parallel implementation of SAMR applications remains a challenge. This paper investigates hybrid runtime management strategies and presents...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Mining Patterns for XML Query Answering Using TAR's

    To extract the information from semistructured documents is a very hard task and is going to become more and more critical as the amount of digital information available on the internet grows. Indeed, documents are often so large that the dataset returned as answer to a query may be too...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Small State and Stretch Efficient Routing for Wireless Networks

    Routing protocols for large wireless networks must address the challenges of reliable packet delivery at increasingly large scales and with highly limited resources. Attempts to reduce routing state can result in undesirable worst-case routing performance, as measured by stretch, which is the ratio of the hop count of the selected...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimized Shortest Path Method for Efficient Data Collection in Wireless Sensor Netwoks

    Sensor nodes in Wireless Sensor Networks are energy-limited. Sensor devices are expected to operate over years with limited power supply. Thus, the energy consumption becomes important compared to throughput, latency. Efficient data collection in Wireless Sensor Networks plays a key role in power conservation. The sink mobility along a constrained...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Handoff in Heterogeneous Wireless Networks Using Vertical Handoff Decision Algorithm

    Among the key issues of Next-Generation Wireless Networks (NGWN), mobility management is one of the most crucial. Because, to providing the seamless connection in the heterogeneous wireless networks, the seamless roaming especially for real time applications is providing is very difficulty. The proliferation of wireless technologies and their ever increasing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Design and Implemetation Reconfigurable Processor & Crossbar Switch in Network On Chip for Adaptable On-Chip Topologies

    A Network-on-Chip (NOC) is used in SOC to make interconnection inside. Due to the changing of communication patterns, the aim of this paper is to the design reconfigurable processor and Reconfigurable Crossbar Switch for NOC Routers (RCS-NR) capable of adapting topologies on demand. Due to the dynamic changing of communication...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Tree Zone Orieted Logic Using Geographic Protocol Over MANET

    In mobile ad Hoc network, group communications are different form. Multicast is a fundamental service for supporting information exchanges and collaborative task execution among a group of users. There are several multicast routing protocols in MANET have been shown to large overhead due to high networks dynamic topology. A number...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    An Efficient Static Ram Cell Design for Low Power Consumption

    A low power Static-Random Access Memory (SRAM) has become a critical component in modern VLSI systems. In cells, the bit-lines are the most power consuming components because of larger power dissipation in driving long bit-line with large capacitance. The cache write consumes considerable large power due to full voltage swing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Error Tolerant Booth Multiplier for Lossy Applications

    Multipliers are the fundamental arithmetic unit in multimedia and digital signal processing applications. The fixed width multipliers are used in those applications where the authors have to maintain a fixed format and allow a little accuracy loss of output data. In this paper, they have proposed a low power technique...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Periodicity Stream-Mining Using Continuous Database

    Periodic stream mining or periodicity detection has a number of applications, such as prediction, forecasting, detection of unusual activities, etc. The data to be analyzed might be noisy (or) perfect data set for which periodicity is to be investigated. There is a need for a comprehensive approach capable of analyzing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Route Diversity in Tree Based Distributed Hash Tables

    Hash tables - which map "Keys" onto "Values" - are an essential building block in modern software systems. Nodes can deny access to keys or misroute lookups. In this paper address both of these problems through replica placement. Replica placement that creates route diversity for these DHTs. Using simulations of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Efficient Security Mechanism for Misbehaving Users in Wireless Mesh Network

    As a combination of ad hoc networks and Wireless Local Area Network (WLAN), the Wireless Mesh Network (WMN) provides a low-cost convenient solution to last-mile network connectivity problem. As such, existing route protocols designed to provide security and privacy protection for ad hoc networks are no longer applicable in WMNs....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Ascendable Datacenter Servers Using Ficonn Bi-Port Structure

    This paper explores a new server-interconnection structure. The commodity server machines used in today's data centers usually come with two built-in Ethernet ports, one for network connection and the other left for backup purposes. Believe that if both ports are actively used in network connections, it can build a scalable,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Segmentation and Denoising of Surveillance Video Using Adaptive Gmm Towards Effective Video Retrieval

    In modern times, the advanced technologies in camera have made the video acquisition more feasible. Data sets collected by image sensors are generally contaminated by noise. Imperfect instruments, problems with the data acquisition process, and interfering natural phenomena can all degrade the data of interest. Surveillance sequences do not only...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Grouping Servicefor Senior Citizens

    SOA is a computing paradigm for generating distributed and heterogeneous software systems. Services are basic elements for generating application in SOA. Service is a platform independent, reusable and loosely coupled software component that is described, registered and discovered. The most obvious capability of SOA is assembling of several services to...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Data Throughput Prediction and Optimization Service for Widely Distributedmany-Task Computing

    A data throughput prediction and optimization service for many-task computing in widely distributed environments. This service uses multiple parallel TCP streams to improve the end-to-end throughput of data transfers. A novel mathematical model is developed to determine the number of parallel streams, required to achieve the best network performance. This...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Clustering and Gateway Management in Vehicular Ad-Hoc Networks

    Vehicle Ad Hoc NETworks (VANETs), based on IEEE 802.11p, and 3G & beyond networks are characterized by their high data transmission rates and wide range communication respectively. Coupling the high data rates of IEEE 802.11p-based VANETs and the wide coverage area of 3GPP networks (e.g., UMTS), this envisions a VANET-UMTS...

    Provided By International Journal of Communications and Engineering