International Journal of Computer Applications

Displaying 1-40 of 8029 results

  • White Papers // Jul 2015

    Survey on Orthogonal Dimensions of Sybil Attack in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) continue to grow and become widely used in many applications in military, ecological, home automation and health-related areas. Due to distributed nature of sensor networks security becomes fundamental requirement for communication among sensor nodes. The inclusion of wireless communication among various sensor nodes suffers from various...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Fault Tolerance Approach in Mobile Distributed Systems

    Mobile agent become very popular and attracted more importance these days due to the exponential growth of internet applications. The design of fault tolerance system become very challenging due to limited bandwidth of wireless network, mobile host mobility, limited local storage, limited battery power and handoff. A distributed system is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Two Tier Reliable User Authentication Scheme for Cloud Environment

    Authenticating users and establishing their identity is the first most part of any computer based application or website. This has to be the most significant point from the security aspect. With the emergence of cloud platforms and their services, the authors' interaction with data, devices, software and applications is witnessing...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Survey: Clustering Algorithms in Data Mining

    In data mining clustering is a technique that's aims to single out the data elements into different clusters based on useful features. In this technique data elements that are similar to one another are placed within the same cluster and those which are dissimilar are placed in different clusters. Many...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Search Based Software Engineering Techniques

    Search Based Software Engineering (SBSE) is the field of software engineering that helps in solving the problems using metaheuristic approach rather than solving the problems manually i.e. it helps in providing the automated solution for the complex problems of software engineering. Search based optimization is used by SBSE to solve...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Applying Machine Learning to Conflict Management in Software Requirement

    Software requirements is a field within software engineering that deals with the establishing the needs of the stakeholders. In this paper, the concern is about the new approach and techniques for incorporating precision and consistency in requirements specifications. Besides these software requirements should be ambiguity free and complete by all...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Knowledge Extraction in Requirement Engineering with Machine Learning Perspective

    Software engineering anticipates a systematic and quantifiable approach for development of a software solution. Requirement engineering predicts the intended behavior and constraints of the software solution well in advance of the software development process; hence it is a very crucial activity in the entire development process. Since requirements are specified...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Energy Aware Routing Protocol for Network Performance Optimization in MANET

    In Mobile Ad-hoc NETwork (MANET) all nodes are battery operated; as battery power or batter energy is limited resource therefore, it requires special attention to minimize energy consumption in MANET. For MANETs, optimization of energy consumption has greater impact as it directly corresponds to lifetime of networks. The various factor...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Recent Trends on Consistent Global Snapshot Algorithms for Distributed Mobile Environments

    Mobile computing allows omnipresent and incessant access to computing resources while the users is on the move In the recent years the mobility issues is one of the most significant development and effect the converging areas of computing and telecommunications the way to compute and communicate is changing rapidly. Failures...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Compromised Security of Wireless Ad-Hoc Networks and its Implications

    Networks have become an integral part of all communications, associations, businesses, services, government/public organizations and human interactions around the globe. Emergence of technologies and dynamism of user needs & access pattern of network resources have shifted paradigm to wireless ad-hoc network infrastructure supporting mobile devices. Ad-hoc networking means building spontaneous...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Exploration of Energy Proficient Routing Protocol in Wireless Adhoc Network

    Today, all of the ad-hoc portable devices operate on their limited battery hence; lifetime of the network is restricted. Energy proficient routing protocols are considered as better solution to provide stability and portability in a network. Here, the main issue is how to maximize the lifetime of a network. To...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Survey and Analysis of Sybil Attack in Peer to Peer Network

    There Peer-To-Peer (P2P) networks is that they are continually subject to Sybil attacks malicious nods can compromise the network by creating and directing large numbers of fictitious identities. In this paper, Sybil attacks may underscore the successfully of such schemes as malicious peers may use fake identities to synthetically manipulate...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Qualitative Analysis of Wireless Sensor Network Simulators

    Wireless Sensor Networks is gaining importance day-by-day and they are more and more promising because of the potential and features available with them to revolutionize life and economy, with its wide range of applications. Wireless Sensor Networks (WSNs) is formed by using large no of motes. Since analytical modelling of...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Overview of Malware Analysis and Detection

    Several methods have been devised to smooth the progress of malware analysis and one of them is through visualization techniques. Visualization technique is a basic method which is used to visualize the features of malware or variants. This field focuses on features of individual variants and also helpful to the...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Digital Signal Matching Technique

    In this paper, the authors describe the matching model of two different voices. Here, the authors are working on digital signals & frequency of particular speech. They have use Mel Frequency Cepstrum Coefficients (MFCC) for matching the frequency of speech as well as used the DISTMIN (DISTance MINimum) for calculating...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Study on Challenges Associated in Coverage Problem in WSN

    To optimize the QoS (Quality-of-Service) in a sensor network, it is required to optimize it under various coverage problems. A network is defined under three main coverage aspects called target coverage, area coverage and barrier coverage. If the network is optimized under all these coverage's, the scalability, reliability and efficiency...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A View on Data Security System for Cloud on Hadoop Framework

    To solve the current data security problem for cloud disk in distributed network, for example transmission, storage security problems, access control and data verification, a network cloud disk security storage system based on Hadoop is proposed. Based on the different secret level of client data, it provides selective encryption method...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Novel and Energy Efficient Routing in Wireless Sensor Networks

    In this paper, the authors present a new approach to energy efficient routing in wireless sensor network. Here multiple routing paths are created based on the energy status of the nodes and they are used one after the other resulting in utilizing the energy equally from all the nodes in...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Certain Investigations on Continuous User Authentication System Using Biometrics

    In the past few years, continuous authentication system is most widely used verification system for personal computers. Continuous Authentication (CA) system verifies the user continuously once a person is logged in. Continuous authentication system prevents the intruders from invoking the system. It passively verifies the system without interrupting the users...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Secured User Authentication using Encrypted Palmprint

    Securing personal privacy and deterring identity theft are national priorities. Biometrics, an emerging set of technologies, provides an effective solution. Foremost examples of are biometric technologies that identify and authenticate faces, hands, palmprints, fingers, signatures, irises, voices and fingerprints. The biometric data whenever transmitted across the network can be stolen...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Face Authentication using Euclidean Distance Model with PSO Algorithm

    In recent technological world lot of devices are invented. Moreover, the focused topic is on security system. Even with lot of security system like finger print based, eye-retina based, pin-code based systems are available and face recognition based security system has vital role of advanced technology. Feature based face authentication...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Data Fusion and Data Aggregation/Summarization Techniques in WSNs: A Review

    Wireless sensor networks are energy constrained networks. Energy consumption in these networks can be reduced by processing the raw data at individual nodes through the application of suitable aggregation technique so that there is minimum amount of data that need to be transmitted towards the sink. The data aggregation functions...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    New Method for Obtaining Digital Signature Certificate using Proposed RSA Algorithm

    Digital signature schemes are mostly used in cryptographic protocols to provide services like entity authentication, authenticated key transport and authenticated key agreement. It is used in a variety of applications to ensure the integrity of data exchanged or stored and to prove to the recipient the inventor's identity. There are...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Effect of Different Modulation Techniques Comparison of Linear MIMO Receivers

    In wireless communication, Multiple-Input and Multiple-Output (MIMO) is the most propitious technology that enhances the system capacity and data rate by using multiple antennas at the receiver and at the transmitter. Efficient signal detection at the receiver is complex task in MIMO systems. The computational complexity of equalization based linear...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Dual Band Microstrip Patch Antenna with I & T Shaped Slots on the Ground Plane

    A new dual band microstrip patch antenna with I and T slots on the ground plane has been designed. Observation has been made for the two resonant frequencies in 2.23-2.37GHz and 4.60-4.76GHz bands with improved impedance bandwidth in comparison to that of reference patch antenna. The proposed antenna can suitably...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Three Notch Multilayer Antenna for C-Band Applications

    A three notch multilayer antenna for C-band applications is presented in this paper. The proposed antenna is composed of a FR-4 and air gap dielectric material, by introducing the two parts, the impedance bandwidth of the antenna can be significantly enhanced. Analysis is done with ground plan. Simulation results show...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Simulator for Calculating Pagerank by Javascript

    The most famous search engines today, Google, Yahoo, Bing and Baidu utilize the popularity in their relevance criteria. In the case of web sites the number of pages is reduced, the determination of this index is simpler. In the case of the sites or the number of web pages is...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Mobile Banking System based on Certificateless Chameleon Hash Function

    Mobile phones are most common way of communication and accessing internet based services. Currently, mobile phones are not only used for regular data communication but also, sending and receiving sensitive data. However, the security of mobile communication is very important concerns for mobile phone users. In this paper, the authors...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Evaluating Perception, Characteristics and Research Directions for Internet of Things (IoT): An Investigational Survey

    Internet of Things (IoTs) is considered to be one of the most recent emerging trends which connect variety of physical objects embedded with electronics equipment's for achieving a particular goal. Since 2013 the concept of IoT has been introduced in the field of networking for converging multiple devices and technologies....

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Survey on Data Integrity Techniques in Cloud Computing

    Cloud computing which is envisioned as the next generation architecture of IT enterprise comes into focus when someone thinks about what IT always needs. It is way to increase capacity or add capabilities without investing in infrastructure as well as licensing cost on new software. Besides of this advantage there...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Framework for Fuzzy Ontology Storing onto Relational Database within an a Priori Data Integration System

    Resolving semantic heterogeneity is still a challenging issue in data integration systems; but it can be strongly fixed when using ontology in an a priori approach where local ontology concepts are linked with shared ontology prior to populating data in corresponding sources. In this paper, the authors describe a defying...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    A Research Paper on Steganography in IPV6

    Steganography is the process to hide a secret message such that it is very difficult to detect the presence of secret message presence. On other way, the existence of secret message is hidden. A covert channel may refer to the actual medium that is used to communicate the information such...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    The Effect of Presentation Variety of Interactive Multimedia Learning to the Learning Result

    In this paper, the authors aim to investigate the impact of many kinds of computer-based interactive multimedia learning presentation to the learning result by controlling the student's prior knowledge. The kinds of learning presentation consist of multimedia learning with high interactivity (animation + visualization + narration) and (static visualization +...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Efficient Mining of High Utility Sequential Pattern from Incremental Sequential Dataset

    Frequent pattern mining is modified by sequential pattern mining to consider time regularity which is further enhanced to High Utility Sequential (HUS) pattern mining by incorporating utility into sequential pattern mining for business value and impact. In the process of mining HUS, when new sequences are added into the existing...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Effcient Duplicate Detection and Elimination in Hierarchical Multimedia Data

    Today's important task is to clean data in data warehouses which has complex hierarchical structure. This is possibly done by detecting duplicates in large databases to increase the efficiency of data mining and to make it effective. Recently, new algorithms are proposed that consider relations in a single table; hence...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Composite Feature Selection Method based on Spoken Word and Speaker Recognition

    In this paper, the authors measure the recognition capability of composite features extracted from speech signal and compare the result with other individually considered features for both spoken word and speaker based recognitions. Standard features like formants (F1, F2, F3), Linear Predictive Coefficients (LPC) and Mel Frequency Cepstral Coefficients (MFCCs)...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Performance Comparison of Various MIMO Detectors in Presence of Gaussian and Non-Gaussian Noise

    The Multiple-Input and Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) technology significantly provides high transmission rate and robustness against multi-path fading and other channel impairments. Mostly, MIMO-OFDM system is analyzed only in presence of Additive White Gaussian Noise (AWGN) only, but in practice, in many actual wireless environments impulsive characteristics...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Outlier Detection in Dataset using Hybrid Approach

    Outlier is a data point that deviates too much from the rest of dataset. Most of real-world dataset have outlier. Outlier analysis is one of the techniques in data mining whose task is to discover the data which have an exceptional behavior compare to remaining dataset. Outlier detection plays an...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    Client-Side Automated Sanitizer for Cross-Site Scripting Vulnerabilities

    Web applications are useful for various online services. These web applications are becoming ubiquitous in the people's daily lives. They are used for multiple purposes such as e-commerce, financial services, emails, healthcare services and many other captious services. But the presence of vulnerabilities in the web application may become a...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2015

    An Enhanced LSB based Video Steganographic System for Secure and Efficient Data Transmission

    The growth of high speed computing devices and Internet has made the data communication very easy and fast. But this advancement has also increased the chances of getting the data snooped at the time of sending and receiving messages over network. So that information has to be secured. In this...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Intrusion Detection Systems - Analysis and Containment of False Positives Alerts

    The dependence on information technology became critical and IT infrastructure, critical data, intangible intellectual property are vulnerable to threats and attacks. Organizations install Intrusion Detection Systems (IDS) to alert suspicious traffic or activity. IDS generate a large number of alerts and most of them are false positive as the behavior...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Robot Teleoperation System Based on GPRS for Militan Confidential

    This paper presents a strategy for using the cellular network, and specifically the general Packet Radio Service, to teleoperate a mobile robot. This allows the system user a wider mobility range and coverage. The system application is developed using Java Programming Language, implementing two teleoperation methods: predefined sequences and instant...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Efficient WS-QoS Broker Based Architecture for Web Services Selection

    Web Service selection is a key component in service-oriented computing. Service-Oriented Architectures follow the find-bind execute paradigm in which service providers register their services in public or private registries, which clients use to locate web services. The QoS based web service selection mechanisms plays an essential role in service-oriented architectures,...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Semantic Cloud for Mobile Technology

    The paper highlights and outlines the architecture of SCM (Semantic Cloud for Mobile), a blend of two emerging web technologies, semantic web and cloud computing, for revolutionizing data access and processing capabilities over mobile platform. The emphasis lies on decoupling of data processing and management from mobile hardware, alongwith the...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Compression of Various Routing Protocol in Wireless Sensor Network

    Wireless Sensor Networks have emerged as an important new area in wireless technology. Wireless Sensor Networks (WSN) consists of numerous tiny sensors deployed at high density in regions requiring surveillance and monitoring. There are many existing protocol, techniques and concepts from traditional wireless network, such as cellular network, mobile ad-hoc...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Regular User Priority Scheme for Performance Improvement in 4G Network

    Wireless network are growing rapidly, leading to overloaded systems, unacceptable delays and increasing computational costs due to inefficient channel allocation strategy. Handoff call is more important over new call so it must provide some priority; this is the prime objective of all channel allocation strategy. This paper proposes regular users...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Broadband Frequency Domain-Based Air Interfaces for 4G Cellular Wireless Systems

    Future-generation cellular wireless systems, transporting high bit rates in non-ideal radio propagation environments, must be robust to severe frequency selective multipath. Further requirements include moderate terminal and base station hardware costs, high spectral efficiency, and scalability of the cost of terminals with respect to their maximum bit rate capabilities. Reconfigurable...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Proactive and Reactive Routing Protocols for Ad Hoc Networks

    Mobile Ad hoc networks are the collection of wireless nodes that can exchange information dynamically among them without pre-existing fixed infrastructure. Because of highly dynamic nature, performance of routing protocols is an important issue. In addition to this routing protocols face many challenges like limited battery backup, limited processing capability...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    Analyzing Core Migration Protocol Wireless Ad Hoc Networks by Adopting Multiple Nodes Diverse Test-bed

    A number of application level multicast protocols have been proposed for core selection and core migration in Mobile Ad Hoc Networks. Core migration is necessary to minimize any disruptions on the transmission of data due to the changes in tree structure and to achieve improvement in the delivery of media...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Classification of Current Routing Protocols for Ad Hoc Networks - A Review

    An ad hoc wireless network is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks

    Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. This paper explains an Effective and Scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Load-Balancing Approach for AOMDV in Ad-Hoc Networks

    Routing protocol is a challenging issue in ad hoc networks. It has been studied thoroughly these years. However, most routing protocols in ad hoc network do not consider the problem of load balance. This paper presents an effective scheme to balance the load in ad hoc network. Ad-hoc On demand...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Black Hole Attack Prevention in Multicast Routing Protocols for Mobile Ad Hoc Networks Using Certificate Chaining

    Security in wireless ad-hoc networks is a complex issue. The wireless and dynamic nature of ad-hoc networks makes them more vulnerable to security attacks when compared with fixed networks. The existing routing protocols are optimized to perform the routing process without considering the security problem. Black hole attack is one...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Secure Group Communication Using Multicast Key Distribution Scheme in Ad Hoc Network (SGCMKDS)

    In Recent years, secure communications have become a important subject of research. The new service for wireless and wired networks is to provide confidentiality, authentication, authorization and data integrity. Security has always been a sensitive issue. In fact, this service becomes necessary to protect basic applications, especially E-commerce and bank...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Characteristics of Cluster - Based Multicast Key Distribution Scheme for Mobile ADHOC Networks

    Many emerging commercial and military applications require secure multicast communication in adhoc environments. Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence key...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These nodes change position...

    Provided By International Journal of Computer Applications

  • White Papers // Sep 2010

    A QoS-Based Resources Reservation Mechanism for Ad Hoc Networks

    For the last several years, there has been a significant increase of interest in supporting Quality of Service (QoS) constraints in Mobile Ad Hoc Networks (AHNs). AHNs include mobile nodes with limited capacities and communication resources. This specificity makes existing solutions for wired networks little suitable and a broad range...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Traffic Pattern Based Performance Comparison of Reactive and Proactive Protocols of Mobile Ad-Hoc Networks

    The primary objective of this paper is to study and investigate the performance measures of Reactive protocols (AODV, TORA) and Proactive protocols (DSDV) routing protocols of MANET using TCP & CBR based traffic models. This paper will simulates the environment used for analyzing, evaluating and implementing AODV, DSDV and TORA...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    PROFIDES - Profile based Intrusion Detection Approach Using Traffic Behavior over Mobile Ad Hoc Network

    Intrusion Detection in MANET is one of the major concern in peer to-peer networking scenario where mobile / wireless nodes communicate with each other without any pre-defined infra-structural setup. This paper presents an overview of various intrusion detection models, identifying its issues, discusses on design and proposes an intrusion detection...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    A Study on the Behavior of MANET Routing Protocols with Varying Densities and Dynamic Mobility Patterns

    Mobility and node density are the two major factors which has much influence on the performance of any routing protocol of mobile ad hoc network. Several previous works highlighted this fact. This paper will evaluates some of the widely used MANET routing protocols with different mobility and network density. The...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Design and Development of a Secured Routing Scheme for Mobile Adhoc Network

    The development of mobile ad hoc network advocates self-organized wireless interconnection of communication devices that would either extend or operate in concern with the wired networking infrastructure or, possibly, evolve to autonomous networks. Unlike traditional wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Optimized Routing in Mobile Ad Hoc Networks Using Evolutionary Location Intelligence

    Evolutionary Location Intelligence on implementing a position based routing, that make forwarding decision based on the geographical position of a packet's destination is concentrated in this paper. One distinct advantage of this model is not necessary to maintain explicit routes. Position based routing does scale well even if the network...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Literature Review of Security Attack in Mobile Ad-Hoc Networks

    Security is a major concern for protected communication between mobile nodes in a hostile environment. In hostile environments adversaries can bunch active and passive attacks against intercept able routing in embed in routing message and data packets. In this paper, the authors focus on fundamental security attacks in Mobile adhoc...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Fuzzy-Controlled Power-Aware Routing Protocol (FPRP) for Mobile Ad Hoc Networks

    In multi-hop wireless ad-hoc networks, designing energy-efficient routing protocols is critical since nodes are power-constrained. However, it is also an inherently hard problem due to two important factors: First, the nodes may be mobile, demanding the energy-efficient routing protocol to be fully distributed and adaptive to the current states of...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Performance Analysis of Congestion Control in Mobile ADHOC Grid Layer

    Mobile Ad Hoc Grid deals with the challenges in resource discovery and job scheduling due to its mobility and power consumption. In this paper a new grid computing technique is implemented to manage the congestion control with job scheduling. The proposed addition of the mobile ad hoc network with in...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile ADHOC Networks

    Mobile Ad hoc NETworks (MANET) are widely used in places where there is little or no infrastructure. A number of people with mobile devices may connect together to form a large group. Later on they may split into smaller groups. This dynamically changing network topology of MANETs makes it vulnerable...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Highly Ensured QOS Routing in Mobile Ad Hoc Networks Based on Multiple Constraints

    Routing protocols for mobile ad hoc networks have been explored extensively in the past years. Most of the work is aimed at finding a shortest path between the source and the destination, without considering the network performance influencing factors like present network traffic, movements and application requirements etc. In the...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    Node Categorization Scheme (NCS) for Throughput Efficiency in Multi-Rate Mobile Ad Hoc Networks

    In multi-rate networks IEEE DCF 802.11 ensures long term equal channel access probability this in turn penalizes the faster stations in this networks. The maximum achievable throughput by any station gets bounded by the slowest transmitting peer. This leads towards the under utilization of the bandwidth. Another reason for bandwidth...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    ZRP Versus AODV and DSR: A Comprehensive Study on ZRP Performance

    Ad hoc networks are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and channel non deterministic behaviour (Interference, multipath, hidden and exposed node problem makes the wireless channel very difficult to predict)This behaviour of Ad hoc networks must be analyzed in detail as a result of pairing...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    On Demand Temporary Parallel Route Recovery for Frequent Link Failure in Adhoc Networks

    Adhoc network is collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure of centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. This concept is basically useful when there is a very high...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Implementation of Mobile Intrusion Detection Controller [MIDC] for Affording Secure Service in MANET Environment

    In this new millennium most of the transactions depend on wireless network. In this context highly secured transaction of information is the need of the hour. During the transaction there must not be any loss of information or there should be no intrusion to assure the secured data transmission. There...

    Provided By International Journal of Computer Applications

  • White Papers // Oct 2010

    MAC Enhancements to Support Quality of Services (QoS) in Ad Hoc Wireless Networks: EMACA (Enhancement of Multiple Accesses with Collision Avoidance)

    Ad hoc Wireless Network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and to some extent guaranteed in advance in...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Performance Evaluation of Routing Protocol and Congestion Control Protocol in Wireless Multi-hop Networks

    Computer networks have long suffered from congestion. Congestion occurs when an increase in the offered load results in a decrease in the effective throughput of the network. The basic cause is that the short term packet arrival rate at some gateway exceeds its service rate. Existing congestion control schemes treat...

    Provided By International Journal of Computer Applications

  • White Papers // Jun 2010

    An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

    Mobility management is a major challenge in Mobile Ad hoc NETworks (MANETs) due in part to the dynamically changing network topologies. For mobile sensor networks that are deployed for surveillance applications, it is important to use a mobility management scheme that can empower nodes to make better decisions regarding their...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Routing Misbehavior in Ad Hoc Network

    Rushing attack may cause more vulnerability in MANET as it can be used as a pre-requisite for launching some other types of Denial of-Service attacks. Significant research efforts have been made towards increasing the survivability of MANET either by developing secure routing algorithms or by improving the robustness of MAC...

    Provided By International Journal of Computer Applications

  • White Papers // Dec 2010

    Mobile Agent as an Approach to Improve QoS in Vehicular Ad Hoc Network

    Vehicular traffic is a foremost problem in modern cities. Huge amount of time and resources are wasted while traveling due to traffic congestion. With the introduction of sophisticated traffic management systems, such as those incorporating dynamic traffic assignments, more stringent demands are being placed upon the available real time traffic...

    Provided By International Journal of Computer Applications

  • White Papers // Jan 2011

    Analytical Study the Performance Evaluation of Mobile Ad Hoc Networks Using AODV Protocol

    The Mobile Ad hoc NETworks (MANETs) have been communicating over wireless mesh channels and support multihop networks. Every node in the MANET is free to move independently in any direction. MANET is a kind of wireless mesh network which operates in Link Layer (LL) of Ad hoc networks. The current...

    Provided By International Journal of Computer Applications

  • White Papers // Nov 2010

    A Load Aware Routing Mechanism for Improving Energy Efficiency in Mobile Ad Hoc Networks

    Integration of Load Balancing mechanisms into routing protocols has elicited significant interest to alleviate congestion and improve the performance of on-demand routing protocols. For the sustained network functionality, load balancing mechanisms need to compute energy efficient paths with lesser traffic. Further severe degradation of network performance is observed due to...

    Provided By International Journal of Computer Applications

  • White Papers // Jul 2010

    Analysis of K-Connected MANETs for QoS Multicasting Using EDMSTs Based on Connectivity Index

    The survivability of the network is closely related to the connectivity of the network. For many network applications such as a sensor network/ad hoc network for battlefield monitoring or wild fire tracking etc., survivability is one of most important requirements, and therefore a number of related problems are proposed. In...

    Provided By International Journal of Computer Applications

  • White Papers // Aug 2010

    Scenario Based Performance Analysis of Variants of TCP Using NS2 - Simulator

    The increasing demands and requirements for wireless communication systems especially in settings where access to wired infrastructure is not possible like natural disasters, conferences and military settings have led to the need for a better understanding of fundamental issues in TCP optimization in MANETS. TCP primarily designed for wired networks,...

    Provided By International Journal of Computer Applications