International Journal of Computer Applications

Displaying 1-40 of 7464 results

  • White Papers // Jul 2015

    Survey on Orthogonal Dimensions of Sybil Attack in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) continue to grow and become widely used in many applications in military, ecological, home automation and health-related areas. Due to distributed nature of sensor networks security becomes fundamental requirement for communication among sensor nodes. The inclusion of wireless communication among various sensor nodes suffers from various...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Compromised Security of Wireless Ad-Hoc Networks and its Implications

    Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc networking means building spontaneous...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Exploration of Energy Proficient Routing Protocol in Wireless Adhoc Network

    Today, all of the ad-hoc portable devices operate on their limited battery hence; lifetime of the network is restricted. Energy proficient routing protocols are considered as better solution to provide stability and portability in a network. Here, the main issue is how to maximize the lifetime of a network. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Qualitative Analysis of Wireless Sensor Network Simulators

    Wireless Sensor Networks is gaining importance day-by-day and they are more and more promising because of the potential and features available with them to revolutionize life and economy, with its wide range of applications. Wireless Sensor Networks (WSNs) is formed by using large no of motes. Since analytical modelling of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Overview of Malware Analysis and Detection

    Several methods have been devised to smooth the progress of malware analysis and one of them is through visualization techniques. Visualization technique is a basic method which is used to visualize the features of malware or variants. This field focuses on features of individual variants and also helpful to the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A View on Data Security System for Cloud on Hadoop Framework

    To solve the current data security problem for cloud disk in distributed network, for example transmission, storage security problems, access control and data verification, a network cloud disk security storage system based on Hadoop is proposed. Based on the different secret level of client data, it provides selective encryption method...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Novel and Energy Efficient Routing in Wireless Sensor Networks

    In this paper, the authors present a new approach to energy efficient routing in wireless sensor network. Here multiple routing paths are created based on the energy status of the nodes and they are used one after the other resulting in utilizing the energy equally from all the nodes in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Certain Investigations on Continuous User Authentication System Using Biometrics

    In the past few years, continuous authentication system is most widely used verification system for personal computers. Continuous Authentication (CA) system verifies the user continuously once a person is logged in. Continuous authentication system prevents the intruders from invoking the system. It passively verifies the system without interrupting the users...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Secured User Authentication using Encrypted Palmprint

    Securing personal privacy and deterring identity theft are national priorities. Biometrics, an emerging set of technologies, provides an effective solution. Foremost examples of are biometric technologies that identify and authenticate faces, hands, palmprints, fingers, signatures, irises, voices and fingerprints. The biometric data whenever transmitted across the network can be stolen...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Face Authentication using Euclidean Distance Model with PSO Algorithm

    In recent technological world lot of devices are invented. Moreover, the focused topic is on security system. Even with lot of security system like finger print based, eye-retina based, pin-code based systems are available and face recognition based security system has vital role of advanced technology. Feature based face authentication...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Smart Grid - A Network based Intrusion Detection System

    Smartgrid is nothing but the electrical power grid which is fully automated. It is the emerging technology in power grid that includes both electrical engineering and information & communication engineering. As the information and communication technology comes into the grid, it is subjected to both physical and cyberattacks. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Symmetric Two-Server Password based Authentication and Key Exchange Protocol Deployed in PaaS

    In real time applications, more number of servers and data centers is needed for fast processing in the required time and to provide high level of security in communication due to rapid growth of data. Password Authenticated Key Exchange (PAKE) protocol is used to verify the authentication of the communicating...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Level's 4 Security in Image Steganography

    Steganography means secret writing of hide data in any others from of digital media. It may be video, audio, text, image, etc. data security is the requirement of digital media. Digital media to make it secure over a various techniques/methods have been proposed by many researchers over decades. To take...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Enabling Data Reliability Security in Regenerating-Coding-based Cloud Storage

    To protect outsourced information in cloud storage con to corruptions, adding defect acceptance to cloud storage, alongside well-organized information responsibleness read-through and recovery procedures, becomes crucial. Make codes offer defect acceptance by marking information across multiple servers, whereas mistreatment less restore transfer than established removal codes throughout failure recovery. Therefore,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Routing Mechanism in Mobile Ad hoc Network with Improved Security and Channel Adaptivity under Fading

    Mobile ad hoc network is a type of wireless network without a fixed topology consist a set of self-organized nodes which are randomly, frequently and unpredictably mobile. In MANETs packet transmission is affected by radio link fluctuations. Hop count is a simple routing metric that calculate the distance between a...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Evaluating the Security Flaws in Web Applications

    Web security is an important area of research. This paper is to focus on web securing schemes. The primary concentration is to interpret the way to handle the SQL (Structured Query Language) injections. It is one of the many web attack methods used by hackers to steal data from industries....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Security Attacks in Mobile Adhoc Networks (MANET): A Literature Survey

    Security is actually an essential issue for the secured conversation in between mobile nodes in a dangerous ecosystem. In dangerous situations adversaries can easily group active and inactive assaults opposing intercept able routing in implant inside routing information as well as data packets. In this specific document, the authors have...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Comprehensive Survey of Security Issues in Routing Protocols of MANETs

    A network that consists of several free mobile nodes competent to move in any direction and allied from end to end through wireless links is termed as Mobile Ad hoc NETworks (MANETs). MANET is basically the self-configured network supporting various modernistic applications. MANET's security is important because of wide range...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Analysis and Study of Network Security at Transport Layer

    In this technology era every applications depends on networks, it may be local or internet, intranet or extranet, wired or wireless. All networks require strong security consideration to ensure confidentiality and integrity of communication. This paper discusses network security and related issued specifically at transport layer, which enables true end...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Access Control List Provides Security in Network

    A significant component representing network security is access control list inspects values of every packet's field and come to a decision how to implement the network policy. Real-life access control list are naturally four dimensional over fields of four packets such as: IP (Internet Protocol) address of source, destination and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Long Term Evolution (LTE) Scheduling Algorithms in Wireless Sensor Networks (WSN)

    Many applications of wireless sensor network such as smart metering, environment monitoring and health care use a large number of sensor nodes, which generate a huge amount of traffic with the specification of the different QoS requirements. Broadband transmission can be achieved through the mobile systems. Long Term Evolution (LTE)...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Analysis of a Full - Duplex WDM-EPON based System with Fiber to Wireless Optical Network

    Wireless technique is speedily becoming more essential during last four decade. Optical wireless channel is a type of communication in which unguided visible, IR and UV light wave is used to carry message signal. Based on transmission range optical wireless channel is used to send message at ultra-short, short, medium,...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Energy based-Genetically Derived Secure Cluster-based Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs), are spatially distributed autonomous sensors used to monitor physical and environmental conditions, such as temperature, sound, pressure, etc. Each device can sense, process and talk to its peers. All the sensor nodes are considered as little objects and therefore the data communication between sensor nodes is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Evaluation of Token Bucket based Congestion Control Protocol for Wireless Sensor Networks

    The distinctive characteristics of Wireless Sensor Network (WSN) such as for instance coherent nature of traffic to base station that happens through its many-to-one topology and collision in physical channel are main factors behind congestion in wireless sensor networks. Also when sensor nodes inject sensory data into network the congestion...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Energy Efficient Routing Protocol for Maximizing Lifetime in Wireless Sensor Networks using Fuzzy Logic

    Wireless sensor networks applications have widely increased in recent years. Energy limitations have become fundamental challenge for designing wireless sensor networks. One of the important and interested features is network lifetime. Many papers have been developed to maximize wireless sensor network lifetime, in which one of the important work is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Analysis of Bidirectional Wireless Optical Channel Integrated with Optical Fiber

    In this paper, the demands of high speed communication are increasing day-by-day. There are so many technique to increase the speed of communication but the most popular technique is free space optical communication also known as Optical Wireless Channel (OWC). OWC is a high speed and large capacity type of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Enhancing the Performance of LEACH Protocol in Wireless Sensor Network

    There is tremendous increase in popularity of Wireless Sensor Network (WSN) as the sensor network connects the virtual world and physical world together. Sensors nodes can be deployed in hostile environment where there is no access of human beings. Sensor nodes rely on battery power where it becomes a difficult...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Power Management and Reducing Routing Overhead and Delay in Wireless Sensor Network with Modified Ad-hoc On Demand Distance Vector Routing Protocol using Threshold Power

    Power management is necessary in wireless sensor network because the nodes are very small in size having a small battery and that too of limited life. The routing algorithms for WSN should satisfy the features of energy consumption optimization and extension of network lifetime. The authors choose to modify AODV...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    High Connectivity with Minimum BER in Wireless Sensor Networks

    Power saving is considered a significant issue relating to wireless ad hoc and sensor networks, where nodes normally use limited battery power. Transmitting using unnecessary high power introduces excessive interference. It is much better if the network designer would have each node transmit at the lowest possible power while the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    GUI based Wireless Communication for Plant Automation

    The field instruments of the process plant are communicated with the remote control room where the supervisor is alarmed to monitor the process parameters regulating at some desired value. The onsite monitoring is limited to only specific supervisors. This paper aims to interface the plant parameters to web server for...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Review on Gray Hole Attack in Wireless Sensor Network

    Sensor networks are currently used in wide spread deployment, so security issues are also a large concern in sensor networks, or sensor node networks. Gray hole attack is very much deleterious attack against the sensor node networks and makes the whole networks malfunctioning, and also affects the whole sensor networks...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Improved General Self Cuckoo Search based Routing Protocol for Wireless Sensor Networks

    WSNs have become major area of research in computational theory due to its wide range of applications. But due to limited battery power the energy consumption has become major limitations of WSNs protocols. Though many protocols have been proposed so far to improve the energy efficiency further but still much...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Study of Ad-Hoc Wireless Networks: Various Issues in Architectures and Protocols

    A wireless ad-hoc network is a collection of nodes which are self-organizing and self-administering in nature. All nodes are connected by wireless links and are free to move randomly. Thus, the network topology keeps on changing rapidly and erratically. These kinds of networks are very flexible and don't need any...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network

    Wireless sensor networks is made of a large number of low-cost and low power sensor nodes that contains strictly limited sensing, computation, as well as communication abilities. Because of resource restricted sensor nodes, it is very important to reduce the amount of data transmission so the average sensor lifespan and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Analysis for Channel Utilization in Wireless LAN

    Wireless network plays an important role in field of communication. Now-a-days, people are always eager to access the data at any time of moment. The wireless network allows to access the Internet from anywhere at any time. The connectivity can be easily established via devices such as Smartphones, laptops, etc....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Security of OFDM through Steganography

    Communication through wireless medium is widely used in today's world. Orthogonal Frequency-Division Multiplexing (OFDM) is a multiplexing method in which data transmission is done over the equally spaced, overlapped carrier frequencies. Transmission of data through OFDM has the advantage that it can achieve high data rate with greater bandwidth and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    VHDL Implementation of Robust WI-FI Positioning System

    Design of a cost effective and accurate positioning of a wireless device is one of the challenging issues in Wireless Local Area Networks (WLANs). In this paper, the authors present a novel positioning system by utilizing WLAN received signal strength measurements. The technique includes two parts; First, distance estimation using...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks

    Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves and...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Envisaging Performance Metrics of ZigBee Wireless Sensors by Topology Variations

    The IEEE 802.15.4 the ZigBee protocol finds numerous applications for commercial buildings and home automation, security, healthcare, medical monitoring, vehicle monitoring, agriculture, environmental monitoring, etc. In this paper, the authors have evaluated the effect of topologies variation i.e. tree, star and mesh on load, delay and throughput in different bands...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Intelligent Car Park Management System using Wireless Sensor Network

    Parking problems are a common problem in most major cities. The limited availability of parking space results in traffic congestion, air pollution and time consuming as well as economy of the nation. The price for parking expansion is usually prohibitively or extremely high. All above various problems can be overcome...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Proactive and Reactive Routing Protocols for Ad Hoc Networks

    Mobile Ad hoc networks are the collection of wireless nodes that can exchange information dynamically among them without pre-existing fixed infrastructure. Because of highly dynamic nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing capability...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Analyzing Core Migration Protocol Wireless Ad Hoc Networks by Adopting Multiple Nodes Diverse Test-bed

    A number of application level multicast protocols have been proposed for core selection and core migration in Mobile Ad Hoc Networks. Core migration is necessary to minimize any disruptions on the transmission of data due to the changes in tree structure and to achieve improvement in the delivery of media...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Classification of Current Routing Protocols for Ad Hoc Networks - A Review

    An ad hoc wireless network is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks

    Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. This paper explains an Effective and Scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Load-Balancing Approach for AOMDV in Ad-Hoc Networks

    Routing protocol is a challenging issue in ad hoc networks. It has been studied thoroughly these years. However, most routing protocols in ad hoc network do not consider the problem of load balance. This paper presents an effective scheme to balance the load in ad hoc network. Ad-hoc On demand...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad Hoc Networks Using Certificate Chaining

    Security in wireless ad-hoc networks is a complex issue. The wireless and dynamic nature of ad-hoc networks makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problem. Black hole attack is one...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Secure Group Communication Using Multicast Key Distribution Scheme in Ad Hoc Network (SGCMKDS)

    In Recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Characteristics of Cluster - Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

    Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Applications

  • White Papers // Mar 2010

    A New Queuing Policy for Delay Tolerant Networks

    Recently there has been much research activity in the area of Delay Tolerant Networks (DTNs). There are several different types of DTNs depending on their characteristics. Routing is one of the key components in the DTN architecture. The basic principle behind the routing protocols for DTNs is store, carry and...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Comparative Study of Gateway Discovery Protocol in MANET

    Connecting the wired and wireless networks particularly the Mobile ad hoc Network is integrated with Internet. Different mechanisms have been proposed to integrate MANETs and the Internet. These mechanisms are differing based on gateway discovery mechanism, and ADHOC routing protocol. When MANET is connected to the Internet, it is important...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Intrusion Response System in AODV for MANET

    The Mobile Adhoc NETwork (MANET) requires effective intrusion response system. This paper presents an intrusion response system that supports the infrastructureless nature of MANETs. This paper proposes a NHELLO and Link Layer based solution towards excluding malicious node which is robust against address spoofing from the attacker. In particular, the...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    A QoS-Based Resources Reservation Mechanism for Ad Hoc Networks

    For the last several years, there has been a significant increase of interest in supporting Quality of Service (QoS) constraints in Mobile Ad Hoc Networks (AHNs). AHNs include mobile nodes with limited capacities and communication resources. This specificity makes existing solutions for wired networks little suitable and a broad range...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Traffic Pattern Based Performance Comparison of Reactive and Proactive Protocols of Mobile Ad-Hoc Networks

    The primary objective of this paper is to study and investigate the performance measures of Reactive protocols (AODV, TORA) and Proactive protocols (DSDV) routing protocols of MANET using TCP & CBR based traffic models. This paper will simulates the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network

    Intrusion Detection in MANET is one of the major concern in peer to-peer networking scenario where mobile / wireless nodes communicate with each other without any pre-defined infra-structural setup. This paper presents an overview of various intrusion detection models, identifying its issues, discusses on design and proposes an intrusion detection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns

    Mobility and node density are the two major factors which has much influence on the performance of any routing protocol of mobile ad hoc network. Several previous works highlighted this fact. This paper will evaluates some of the widely used MANET routing protocols with different mobility and network density. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

    The development of mobile ad hoc network advocates self-organized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Simulation Based Analysis of Adhoc Routing Protocol in Urban and Highway Scenario of VANET

    VANET (Vehicular Adhoc NETwork) research field is growing very fast. It has to serves a wide range of applications under different scenario (City, Highway). It has various challenges to adopt the protocols that can serve in different topology and scenario. This paper presents a comparative study of the adhoc routing...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Empirical Study of CSMA, MACA and EMACA Protocols to Support QoS Under Varying Conditions of Pause Time in Ad-Hoc Wireless Network by Resources of DSR Routing Protocol

    DSR routing protocol was used to evaluate the MACA and EMACA performance. Results show that the EMACA simulation performs well as compared to MACA in sense of Throughput, Total Packet Receive, Drop Packet Ratio and Average Jitter under varying conditions of Pause Time. This paper will try to change route...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Hint Based Power Efficient Routing Protocol for MANETs

    Energy Efficient Hint based routing Protocol (EEHP) in wireless networks is the problem of finding energy efficient shortest active path which also senses the node breakage before occurrence of disconnection and performs a handoff. In the existing Hint Based Routing Protocol (HBP), the nodes discover an active path to the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Framework to Prevent Mobile Sinks Accessing by Unauthorized Nodes in WSN

    Due to resource constraint nature of sensor nodes, the network suffers by computation and security problems. These nodes create a wireless sensor network that used sink stable or mobile as per required applications. Therefore, various traditional security techniques of the traditional networks are not possible to be applied on this...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Node Categorization Scheme (NCS) for Throughput Efficiency in Multi-Rate Mobile Ad Hoc Networks

    In multi-rate networks IEEE DCF 802.11 ensures long term equal channel access probability this in turn penalizes the faster stations in this networks. The maximum achievable throughput by any station gets bounded by the slowest transmitting peer. This leads towards the under utilization of the bandwidth. Another reason for bandwidth...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    ZRP Versus AODV and DSR: A Comprehensive Study on ZRP Performance

    Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non deterministic behaviour (Interference, multipath, hidden and exposed node problem makes the wireless channel very difficult to predict)This behaviour of Ad hoc networks must be analyzed in detail as a result of pairing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    On Demand Temporary Parallel Route Recovery for Frequent Link Failure in Adhoc Networks

    Adhoc network is collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure of centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. This concept is basically useful when there is a very high...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment

    In this new millennium most of the transactions depend on wireless network. In this context highly secured transaction of information is the need of the hour. During the transaction there must not be any loss of information or there should be no intrusion to assure the secured data transmission. There...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    MAC Enhancements to Support Quality of Services (QoS) in Ad Hoc Wireless Networks: EMACA (Enhancement of Multiple Accesses with Collision Avoidance)

    Ad hoc Wireless Network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and to some extent guaranteed in advance in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Evaluation of Routing Protocol and Congestion Control Protocol in Wireless Multi-hop Networks

    Computer networks have long suffered from congestion. Congestion occurs when an increase in the offered load results in a decrease in the effective throughput of the network. The basic cause is that the short term packet arrival rate at some gateway exceeds its service rate. Existing congestion control schemes treat...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2010

    An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

    Mobility management is a major challenge in Mobile Ad hoc NETworks (MANETs) due in part to the dynamically changing network topologies. For mobile sensor networks that are deployed for surveillance applications, it is important to use a mobility management scheme that can empower nodes to make better decisions regarding their...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Routing Misbehavior in Ad Hoc Network

    Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Analytical Study the Performance Evaluation of Mobile Ad Hoc Networks Using AODV Protocol

    The Mobile Ad hoc NETworks (MANETs) have been communicating over wireless mesh channels and support multihop networks. Every node in the MANET is free to move independently in any direction. MANET is a kind of wireless mesh network which operates in Link Layer (LL) of Ad hoc networks. The current...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Load Aware Routing Mechanism for Improving Energy Efficiency in Mobile Ad Hoc Networks

    Integration of Load Balancing mechanisms into routing protocols has elicited significant interest to alleviate congestion and improve the performance of on-demand routing protocols. For the sustained network functionality, load balancing mechanisms need to compute energy efficient paths with lesser traffic. Further severe degradation of network performance is observed due to...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Replacing Conventional Telephones by VoIP: Their Major Constraints & Solutions

    With the telecommunication traffic increasing each year, there is a need for developing a communication system which is more cost efficient. In this paper the authors have compared conventional telephone systems to VoIP communication and explored the possibility of replacing all conventional telephones using VoIP, the constraints faced by the...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Power Control Algorithms in Wireless Communication

    Radio resources in wireless communication systems, implementing different multiple access techniques, must be wisely managed. This perspective is pivotal since the variations in propagation channel are very fast. This complexity in the cellular system periodically contributes to different interference levels, high or low, resulting in the degradation of the system...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Cryptography and Steganography

    Cryptography and steganography, the art of transforming the code or the plain text into either the encrypted code or a pictures format, as used by the steganographic feature, is the matter of great deal in the modern world of the ruler "Security". Everyone in the entire scenario now emphasizes the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    A Secure Multiparty Product Protocol for Preserving the Privacy in Collaborative Data Mining

    In the modern business world, collaborative data mining becomes especially important because of the mutual benefit it brings to the collaborators. During the collaboration, each party of the collaboration needs to share its data with other parties. If the parties don't care about their data privacy, the collaboration can be...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2010

    Implementation of Cloud Computing on Web Application

    Cloud computing is a new method to add capabilities to a computer without licensing new software, investing in new hardware or infrastructure or training new personnel. Applications are purchased, licensed and run over the network instead of users desktop. It provides common business applications online that are that are accessed...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Accessing Remote Application Without Installation at Host End Through Cloud Computing

    Cloud computing is an upcoming efficient networking computing environment. The work proposes sharing an application across various clients of a host system via cloud computing. The sharing is performed between the host storage system and the remote storage system in a cloud computing environment. The Host storage device of the...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Model Based Approach to Implement Cloud Computing in e-Governance

    In the current scenario every enterprise wants to implement Cloud Computing to fulfill their computing needs. These changes naturally should reflect the way government functions in terms of the organization of the government, its relationship with its citizens, institutions and businesses and cooperation with other governments. The critical problem discussed...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Cloud Computing - A Hope for the Rural India

    Rural population being the majority of Indian population has the potential of making India an economic superpower and a developed country but in the present scenario this majority is completely oblivious to the power and capability of Information technology in improvement of business opportunities and employment because of the huge...

    Provided By International Journal of Computer Applications