International Journal of Communications and Engineering

Displaying 321-349 of 349 results

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Computing Process Execution in Multicloud Environment

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing in Mobile Ad-hoc Cognitive Radio Networks

    Recent research activities about Cognitive Radio (CR) are mainly focusing on opportunistic spectrum access and spectrum utilization. However, CR technology will have significant impacts on upper layer performance in wireless networks, especially in Mobile Ad-hoc NETworks (MANETs). In this paper, the authors study topology control and routing issues in CR-MANETs...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving QoS for MANET By Using Energy Conserved Cluster Scheme

    Now-a-days, wireless networks are becoming more popular and it can be used in all real world applications. So it is necessary to provide a good Quality of Service (QOS) for delivering a voice, video and data. To provide different types of priority to different types of applications, QoS will provide...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Passenger Assisting System

    Advanced cell phones systems are developing to support the people to live in semi-independent and independent environments also it perform essential Activities for Daily Livings (ADLs). The approach taken is regarding context-aware and sensor enriched environments for home and medical care settings. It generally focused on the following goals, providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximizing The Performance of Wireless Ad Hoc Networks Using ALOHA and CSMA Protocols

    The performances of the MA protocols are analyzed in wireless ad-hoc networks. The main objective is correct reception of packets at its intended receiver in wireless adhoc network and the analysis is made in terms of throughput, delay and outage probability. In particular, two MAC protocols, ALOHA and Carrier Sense...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Hybrid Job Scheduling Strategy for Computational Grid Environment

    Grid computing is an extensive technology which has the potential to solve large scale scientific problems in an integrated heterogeneous environment. For such an infrastructure, efficient scheduling of jobs and management of resources serve as the key aspects to improve the efficiency and to exploit the capabilities of the emergent...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimal Protocol for Cloud Cache Services

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy-Efficient Dynamic Data Aggregation and Routing Trees for WSN

    Analysis and construction of localized, self organizing, robust and energy-efficient data aggregation tree approaches for sensor networks, named as Localized Power-Efficient Data Aggregation Protocols (L-PEDAPs). They are based on topologies, such as LMST and RNG, that can approximate minimum spanning tree and can be efficiently computed using only position or...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Parallel Data Processing Protocol Using Dynamic Resource Allocation Tool

    Cloud computing has emerged as the most apt solution for businesses and services because of reduced costs. Software and Hardware have been used as services in cloud computing. - IAAS (Infrastructure As A Service). As clouds reduce load on the client both in terms as software or hardware, the server...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximizing The Lifetime of Wireless Sensor Networks by Specific Routing

    In Wireless Sensor Networks, nodes have limited energy. Nodes can forward messages based on the available energy. This paper develop selective message forwarding schemes. This scheme will depend on parameters such as the available battery at the node, the energy cost of retransmitting a message, or the importance of messages....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Scheduling Algorithm for Minimizing The Queue Over-Flow Probability in Cellular Networks

    The use of optimization and economic ideas in network resource allocation has a long history, going back to the study of transportation networks. The proposal is to use as adaptation variables the components of rate for each path from source to destination. In this paper, a wireless scheduling algorithms for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multicast Content Delivery in Multimedia using Protocol Independent Multicast Sparse Mode (PIM-SM)

    Traffic Engineering is the emerging mechanism for the Internet Network Provider required optimizing network performance and traffic delivery. In the multicast communication the message is transferred from one sender to various active receivers instead of all receivers like broadcast communication. Traffic is a major problem in the multicast communication which...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Routing in Dynamic AODV Protocol for Predicting Route Lifetime

    A Mobile Ad-hoc NETwork is defined as a transient network which is formed dynamically by the collection of nodes which are arbitrary. It can also be called as infrastructure less network, because it has no structure frame for positioning the nodes, these nodes are combined and this union forms a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Minimizing Transmit Power Using Efficient and Reliable Routing Protocol in Wireless Sensor Networks for Avionics

    The main design issues for a sensor network are conservation of energy available at each sensor node. Nodes have limited energy and forward messages of different priorities are frequent in wireless sensor networks. In this paper, reliable selective forwarding is based on available battery, importance of messages, problems of interference...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Biometric Authentication for Copyright Protection Using Watermarking Technichines

    In this paper, the authors proposes a feature-based robust digital image watermarking algorithm is proposed to achieve the goal of image authentication and protection simultaneously. The first step is to identify the feature key areas for embedding. The Hessian-Affine feature detector and Gillie's key detector are used for this purpose....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Quality of Service for Internet Protocol Television (IPTV) On-Demand Services

    IPTV system is excellently suited to support on-demand services, because it easily conveys the user request and it can straightforwardly address each user individually. But due to the traffic, caches are deployed in some parts of the network. Due to limited cache size and dynamic nature of movie popularity (volatile),...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Survey on Workflow Scheduling Algorithms and Map Reduce Method in Cloud Environment

    Cloud computing is internet based computing, whereby shared resources, software and information are provided to computers and other devices on demand, like a public utility. Cloud computing is technology that uses the Internet and central remote servers to maintain data and applications is a new benchmark towards enterprise application development...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Authenticated Superseding Nearest Neighbor Search

    Recent applications using nearest neighbor search need proof of result correctness on high dimensional data. In addition multi-step Nearest Neighbor (NN) similarity search are used in most of the distance computation scenarios for user demanded data source availability which are expensive. Optimality of distance similarity search needs adaptability of multi-step...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Using Stochastic W.Ell-Formed Petrinets in Mobile Network to Perform Call Admission Control

    Call admission protocols play a central role in determining both the performance of any network and the revenue (number of customers using the network and their degree of satisfaction) of the network. Call Admission Control (CAC) is such a provisioning strategy to limit the number of call connections admitted into...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Performance Analysis of Computing Process Execution in Multicloud Environment

    Cloud computing is gaining acceptance in many IT organizations, as an elastic, flexible and variable-cost way to deploy their service platforms using outsourced resources. Unlike traditional utilities where a single provider scheme is a common practice, the ubiquitous access to cloud resources easily enables the simultaneous use of different clouds....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Routing in Mobile Ad-hoc Cognitive Radio Networks

    Recent research activities about Cognitive Radio (CR) are mainly focusing on opportunistic spectrum access and spectrum utilization. However, CR technology will have significant impacts on upper layer performance in wireless networks, especially in Mobile Ad-hoc NETworks (MANETs). In this paper, the authors study topology control and routing issues in CR-MANETs...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Improving QoS for MANET By Using Energy Conserved Cluster Scheme

    Now-a-days, wireless networks are becoming more popular and it can be used in all real world applications. So it is necessary to provide a good Quality of Service (QOS) for delivering a voice, video and data. To provide different types of priority to different types of applications, QoS will provide...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Passenger Assisting System

    Advanced cell phones systems are developing to support the people to live in semi-independent and independent environments also it perform essential Activities for Daily Livings (ADLs). The approach taken is regarding context-aware and sensor enriched environments for home and medical care settings. It generally focused on the following goals, providing...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximizing The Performance of Wireless Ad Hoc Networks Using ALOHA and CSMA Protocols

    The performances of the MA protocols are analyzed in wireless ad-hoc networks. The main objective is correct reception of packets at its intended receiver in wireless adhoc network and the analysis is made in terms of throughput, delay and outage probability. In particular, two MAC protocols, ALOHA and Carrier Sense...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Hybrid Job Scheduling Strategy for Computational Grid Environment

    Grid computing is an extensive technology which has the potential to solve large scale scientific problems in an integrated heterogeneous environment. For such an infrastructure, efficient scheduling of jobs and management of resources serve as the key aspects to improve the efficiency and to exploit the capabilities of the emergent...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Optimal Protocol for Cloud Cache Services

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy-Efficient Dynamic Data Aggregation and Routing Trees for WSN

    Analysis and construction of localized, self organizing, robust and energy-efficient data aggregation tree approaches for sensor networks, named as Localized Power-Efficient Data Aggregation Protocols (L-PEDAPs). They are based on topologies, such as LMST and RNG, that can approximate minimum spanning tree and can be efficiently computed using only position or...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Parallel Data Processing Protocol Using Dynamic Resource Allocation Tool

    Cloud computing has emerged as the most apt solution for businesses and services because of reduced costs. Software and Hardware have been used as services in cloud computing. - IAAS (Infrastructure As A Service). As clouds reduce load on the client both in terms as software or hardware, the server...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Maximizing The Lifetime of Wireless Sensor Networks by Specific Routing

    In Wireless Sensor Networks, nodes have limited energy. Nodes can forward messages based on the available energy. This paper develop selective message forwarding schemes. This scheme will depend on parameters such as the available battery at the node, the energy cost of retransmitting a message, or the importance of messages....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A New Scheduling Algorithm for Minimizing The Queue Over-Flow Probability in Cellular Networks

    The use of optimization and economic ideas in network resource allocation has a long history, going back to the study of transportation networks. The proposal is to use as adaptation variables the components of rate for each path from source to destination. In this paper, a wireless scheduling algorithms for...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Multicast Content Delivery in Multimedia using Protocol Independent Multicast Sparse Mode (PIM-SM)

    Traffic Engineering is the emerging mechanism for the Internet Network Provider required optimizing network performance and traffic delivery. In the multicast communication the message is transferred from one sender to various active receivers instead of all receivers like broadcast communication. Traffic is a major problem in the multicast communication which...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Energy Efficient Routing in Dynamic AODV Protocol for Predicting Route Lifetime

    A Mobile Ad-hoc NETwork is defined as a transient network which is formed dynamically by the collection of nodes which are arbitrary. It can also be called as infrastructure less network, because it has no structure frame for positioning the nodes, these nodes are combined and this union forms a...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Minimizing Transmit Power Using Efficient and Reliable Routing Protocol in Wireless Sensor Networks for Avionics

    The main design issues for a sensor network are conservation of energy available at each sensor node. Nodes have limited energy and forward messages of different priorities are frequent in wireless sensor networks. In this paper, reliable selective forwarding is based on available battery, importance of messages, problems of interference...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Biometric Authentication for Copyright Protection Using Watermarking Technichines

    In this paper, the authors proposes a feature-based robust digital image watermarking algorithm is proposed to achieve the goal of image authentication and protection simultaneously. The first step is to identify the feature key areas for embedding. The Hessian-Affine feature detector and Gillie's key detector are used for this purpose....

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Achieving Quality of Service for Internet Protocol Television (IPTV) On-Demand Services

    IPTV system is excellently suited to support on-demand services, because it easily conveys the user request and it can straightforwardly address each user individually. But due to the traffic, caches are deployed in some parts of the network. Due to limited cache size and dynamic nature of movie popularity (volatile),...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Survey on Workflow Scheduling Algorithms and Map Reduce Method in Cloud Environment

    Cloud computing is internet based computing, whereby shared resources, software and information are provided to computers and other devices on demand, like a public utility. Cloud computing is technology that uses the Internet and central remote servers to maintain data and applications is a new benchmark towards enterprise application development...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    High Security Using LSA in MANET

    In this paper, the authors describes enhancement of the security using LSA for data transaction in MANET. IDS is developed and deployed in each leader where all the nodes are grouped under the leaders. Leaders are nothing but the Cluster Head. In addition the nodes are made to be attentive...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Control of Micro Aerial Vehicle Using Vision Based System in an Unknown Environment

    In this paper, the authors deals with the surveillance of an indoor unknown environment using a micro aerial vehicle. The project describes the methodology behind the path plan and the obstacle avoidance for the vehicle. The sensor that is used to identify the obstacle is purely a camera. The use...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Top-K Dominating Queries in Uncertain Databases

    Now-a-days, most applications return to the user a limited set of ranked results based on the individual user's preferences, which are commonly expressed through top-k queries. From the perspective of a manufacturer, it is imperative that her products appear in the highest ranked positions for many different user preferences, otherwise...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    A Fact Obscuring Setup Using Guarded Majority Vote Strategy

    In steganography, the detectability of hidden data in a stego object is mostly influenced by four basic ingredients; the cover object, the selection rule used to identify individual elements of the cover that might be modified during embedding, the type of embedding operation that modifies the cover elements and the...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhanced Overlay Multicast for Enormity of Data Dissemination in Cloud Servers

    In cloud when the servers are sharing their data storage through their proximity nodes as server, these processes disturbed by the frequent join and departure or failure of server node. Data driven multicast protocols that do away with tree to improve resilience under the network churn. The response time of...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Enhancement of Privacy Preservation and Trust Negotiation in Access Control of Web Services

    The huge success of the Internet as a platform for the distribution of web services and dissemination of information makes the protection of services a fundamental requirement. Considering the large success and application of XACML in security domain, the authors extend the XACML architecture and modules so, that it provides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Blocking and Blacklisting Misbehaving Users in Anonymizing Networks using Nymble

    Nymble is a system that provides a blocking mechanism to a server to protect it from misbehaving users connecting through anonymizing networks such as Tor. Anonymous networks allow anyone to visit the public areas of the network. Here users access the Internet services through a series of routers, this hides...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Dynamic Authenticated Web Service for Cross Realms Secure Group Communication

    Providing authentication for the messages exchanged between group members in addition to confidentiality is an important issues in web services secure group communication. Collaborating services in a system with a Service Oriented Architecture (SOA) may belong to different security realm but often need to engaged dynamically at run time. If...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    Power Saving Component for Cooperative Multi-Channel MAC Protocols

    Distributed Information SHaring (DISH) is a new cooperative approach to designing multichannel MAC protocols. It aids nodes in their decision making processes by compensating for their missing information via information sharing through other neighboring nodes. This approach was recently shown to significantly boost the throughput of multi-channel MAC protocols. However,...

    Provided By International Journal of Communications and Engineering

  • White Papers // Mar 2012

    WIIAR-A Wireless Game Controller for Augmented Reality Game

    In this paper, the authors describes how to use a wireless remote a san Augmented Reality Game Controller. Augmented Reality (AR) is a growing area in virtual reality research. An augmented reality system generates a composite view for the user. It is a combination of the real scene viewed by...

    Provided By International Journal of Communications and Engineering