International Journal of Computer Science and Telecommunications

Displaying 1-40 of 192 results

  • White Papers // Feb 2014

    Security Issues and Contradict Measures in Wireless Mesh Networks

    As wireless networks have evolved into next generations, Wireless Mesh Networks (WMNs) have proved to be a massive infrastructure for better communication between enormous entity nodes. WMNs are extremely dependable, as every node is associated with all others likewise sketched in mesh layout. WMN network nodes consist of clients and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2014

    An Overview of Intrusion Detection System (IDS) along with its Commonly Used Techniques and Classifications

    The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2014

    Restructuring Network Infrastructure with Software Defined Networking

    Home network is very challenging to manage because of the complexity of underlying infrastructure. Network's underlying complexity is either hidden or exposed by the existing network interfaces, but the visible information is not necessarily helpful for the user to complete the desired tasks. However, underlying network and protocols can be...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    Fair Cloud Management System

    Cloud computing offers multiple advantages comparing to \"Traditional\" computing infrastructures. However, all customer data are stored on a Virtual Machine (VM) or on a cloud of a Service Provider (SP). Therefore, service quality and data safety are highly dependent on the SP. It also means that these issues are dependent...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2013

    OTPK PAKE Protocol with TRNG Based Key Generation

    In earlier, two smart card based password authentication key exchange protocols were proposed by lee et al. and Hwang et al. respectively. But neither of them achieves two factor authentication fully since they would become complete insecure once one factor is broken. To overcome these two factor authentication problem in...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Approach to Improving Localization Systems in Networks of Wireless Sensors

    In recent years, wireless sensor networks are central to the research activities of the scientific community, particularly given the vast potential applications such as medical care, smart homes, and or environmental monitoring. In the context of wireless sensor networks, the localization technique \"Range-free\" is more efficient with respect to the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Algorithm for Weighted Association Rules for Sequential Data

    All the available algorithms working on arranging sequence in the database either in ascending or descending order. It is sometimes does not give result as per need. In the online admission process and in train/flight reservation, choices have significant role and if by using available algorithms for analysis purpose, the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Nov 2013

    Performance Improvement of Information Exchange between the Virtual Machines on the Same Physical Host

    Virtualization environment provides VMs which are isolated from each other. This isolation helps co-resident VMs use original transport protocols like UDP and TCP for information exchange. Using original protocols does not take advantage of being on the same host of VMs because of unnecessarily overheads. Running VMs are processes on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

    Now-a-days the Mobile Ad-hoc NETworks (MANETs) become an important field in the wireless area for user applications. Due to its dynamic nature of this networks the main problem is how to design an effective routing algorithm that can adapt its behavior to frequent and rapid changes in the network due...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    A Novel Approach for Script Based Password Generation by Using Image Partitioning

    With increasing demand of security, ample of security measures and techniques have been proposed in the literature. Text or password based authentication can be easily compromised with few finger strokes or attacks. Image-Based-Authentication (I.B.A.) is a good alternative since images are easier to recall than alphanumeric passwords. Therefore, in this...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Coupling Two Chaotic Systems in Order to Increasing the Security of a Communication System - Study and Real Time FPGA Implementation

    A Pseudo Random Numbers Generator (PRNG) based on chaotic systems is developed in this paper. The main goal of this paper is to increase the security of a chaotic crypto system especially against known plaintext and chosen plaintext attacks by coupling two chaotic systems, the h

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Hierarchical Energy Efficient Routing Protocol (HEERP) for Wireless Sensor Networks (WSN)

    Wireless sensor network consists of an enormous number of small disposable sensors which have limited energy. These sensors cannot be replaced once they are deployed, as the users usually have no access to these nodes. In many situations like battle field monitoring, rescue operations, the battery operated nodes usually have...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    A Proposed Secure Network Model for Implementing Smart Grid Applications in Ghana with WiMAX Technology

    Advocates of smart grid networks implementation believes that smart grids will deliver a more secure, sustainable and affordable energy for future generations of consumers. It is also believed that smart grids would underlie much of the infrastructure which makes everyday life possible. In order to realize this dream, an Ultra...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Oct 2013

    Performance Analysis and Deployment of VoLTE Mechanisms Over 3GPP LTE-Based Networks

    Long term evolution based networks lack native support for Circuit Switched (CS) services. The Evolved Packet System (EPS) which includes the Evolved UMTS Terrestrial Radio Access Network (E-UTRAN) and Evolved Packet Core (EPC) is a purely all-IP packet system. This introduces the problem of how to provide voice call support...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    A Review Study on the Privacy Preserving Data Mining Techniques and Approaches

    With the extensive amount of data stored in databases and other repositories it is very important to develop a powerful and effective mean for analysis and interpretation of such data for extracting the interesting and useful knowledge that could help in decision making. Data mining is such a technique which...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Acknowledge Enabled Secure Algorithm for Dynamically Updating Programs Installed in Wireless Sensor Nodes

    Wireless sensor networks comprised of several battery powered sensor nodes deployed in hostile environment. There are several programs installed in wireless sensor nodes, time to time these programs need to update in secure manner, such that any unauthorized person could not update the programs. Sensor nodes have several constraints so...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    An Efficient Reactive Routing Security Scheme Based on RSA Algorithm for Preventing False Data Injection Attack in WSN

    Wireless sensor networks are vulnerable to various attacks. Injecting false data attack is one of the serious threats to wireless sensor network. In this paper, adversary reports bogus information to the sink which causes error decision at upper level and energy waste in en-route nodes. Several authentication techniques using en-route...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Hybrid Evolutionary Game Theory in QoS Routing of Wireless Mesh Networks

    Wireless mesh networks are a powerful and reliable solution to create and access wireless broadband services for internet service providers, network construction, military applications and other end users are considered. These networks have features such as high reliability, low installation cost, wide coverage area and connect to the network automatically....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Comparative Study of AODV and OLSR Protocols in MANET Network Under the Impact of Black Hole Attack

    Wireless networks are raising fast today, as users wants to have wireless network anywhere they are located. Mobile Ad-hoc NETworks also named as MANETs became one of the most well-liked wireless networks because it is easy to be deployed and due to its dynamic nature. Existence of MANETs created a...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2013

    Performance Analysis of WiMax Physical Layer Under Scrambling Security Threat Using MATLAB Simulation

    In this paper the authors present on PHYsical laYer (PHY) of the WiMAX. Scrambling and jamming are two security threats which can occur at physical layer of the WiMAX network. In WiMAX environment jamming and scrambling threats can be destroyed the communication. Scrambling is a type of jamming and it...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Aug 2013

    Implementation of MAC Layer Security Protocol in WiMAX Using OMNET++ Simulator

    WiMAX IEEE 802.16 is stated as worldwide interoperability for microwave access intended to facilitate the interoperation and adaptation of wireless MAN. WiMAX is capable of providing high data output and low delays in different modes of operation. For these reasons WiMAX is useful in organizational and end-client structures. Before the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2013

    Efficient Grid-Based MANET Routing Protocol

    The authors propose a new reliable MANET routing protocol which uses a logical two dimensional grid. The proposed protocol is called Efficient Grid-based Routing Protocol (E-GRP). E-GRP is based on the GRID routing protocol. The main new features of E-GRP compared to GRID is the ability to work with different...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2013

    A Survey on Multicast Routing: Comparison, Analysis and Evaluation

    Multicasting plays a particular part in various applications of Mobile Ad-hoc NETwork (MANET). It extensively advances the effectiveness of this network, a capability of the channels and the consumption of energy in battery. The pervasive exercise of non static and little instruments that can be carried and becoming extremely famous...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2013

    A Simulation-Based Performance Evaluation of AODV and DSR in Mobile Ad-Hoc Networks (MANETs)

    In this paper the authors evaluate and compare the performance of two reactive routing protocols for mobile ad-hoc networks: Ad hoc On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The paper focuses on the design and evaluation of routing protocols in mobile ad-hoc networks. Study and implementation of these...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2013

    Secure Analysis for Secure Routing Protocols over MANET

    Security is one of the important aspects in Mobile Ad-hoc NETwork (MANET). Also routing algorithm in MANET is dissimilar than traditional routing. This paper provides limits of traditional routing protocols if used to MANET. This paper also describes routing protocols at this time used in MANET and place focus on...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jun 2013

    A Proposed Campus Building Process in Cloud Computing

    A good understanding of the cloud computing technology, its components and their interrelationships is crucial for decision makers who intend to adopt this novel technology. Towards the end-goal of establishing a simple cloud computing platform which satisfies some of the scientific needs of the academic and research community within the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    A Comparative Study of Handoff Schemes in Vehicle to Infrastructure Using Mobile WiMAX

    With the increase in user mobility, there is need for seamless handover when mobile applications and services are being used especially in the context of vehicular Ad-Hoc NETworks (VANET), in order to enhance the user experience thus affecting the quality of service. This paper looks at VANET with WiMAX with...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    Towards a Perspective of Web Application Vulnerabilities and Security Threats

    The rapid and tremendous growth of Information and Communication Technology (ICT) has increased access to web applications. This increased access has paved the way for disadvantageous security and vulnerable threats in the form of attacks in web applications. Various detection and prevention techniques have been proposed by researchers in the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    Performance Evaluation of ATM Networks With Round Robin and Weighted Round Robin Algorithm

    The Asynchronous Transfer Mode (ATM) Network is believed to be capable of supporting various services with drastically different traffic characteristics and Quality of Service (QoS) requirements. The deployment of integrated services with a broad range of burstiness characteristics and their integration through statistical multiplexing has focused a great deal of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    A Survey on Caching, Replication and Crowdsourcing in Mobile Environment

    In this new era of technology, the mobile devices are available with various features. The main functionality of the mobile devices became effective information sharing i.e. information access on every finger touch, which makes the whole world small. The information sharing is done through various platforms like social networking, cloud...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Performance Degradation of Heterogeneous Wireless Sensor Network in the Presence of Non Cooperative Nodes

    Recently Wireless Sensor Networks (WSN) has gained research interest for remote area monitoring and tracking in unattended environments. WSN may be heterogeneous to provide resources and aggregation of resources will be helpful for efficient distributed computing. Sensor nodes in WSN are used to collect application specific data, perform some pre...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Performance Analysis of Cluster Based Secure Multicast Key Management in MANET

    Mobile Ad-hoc NETwork (MANET) is a group of wireless nodes join together to form a network without a defined architecture. It is formed dynamically as the nodes are mobile in nature. This characteristic of MANET could lead to insecure information exchange. Applications in Mobile Ad-hoc NETworks (MANET) such as military...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    A Survey on Software Security Testing Techniques

    This paper briefs a survey on software security techniques. Software security testing is not the identical as testing the correctness and competence of security functions implemented by software, which are most frequently verified through requirements-based testing. These tests are important; they expose only a small piece of the depiction needed...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Face and Gait Fusion Methods: A Survey

    Biometric authentication of a person is highly challenging and complex problem. Face and gait identifications in video have received significant attention. Consequently, their identification problems have challenges due to their large varying appearances and high complex pattern distributions. However, the complementary properties of these two biometrics suggest fusion of them....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    An Assessment on Active Queue Management in Mobile Ad-Hoc Network

    The RED queue management algorithm achieves high throughput and low average delay by detecting and avoiding the incipient congestion. The detection of incipient congestion is based on calculation of average queue length and RED parameter settings. To avoid the congestion in the network, operators should have a priori estimations of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    New Algorithm for SIP Flooding Attack Detection

    Voice over Internet Protocol (VoIP) services are based on standardized and open technologies (i.e., SIP, H.323) using servers reachable through the Internet, implemented in software and provided often over general purpose computing hardware. Therefore, such services can suffer from various security threats as denial of service attacks. In this paper,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    The Switch Hierarchical Network Design Model (SHiNDiM): A Mechanism for Identifying and Determining the Correct Switch for the Appropriate Position in the Network Layer

    Designing and developing a reliable and stable network required installing the right switches in the correct positions of the hierarchical network layers. The identification, acquisition and determination of the right switches required the expertise of highly skilled and qualified network Engineers. However, employing and maintaining such expertise in some of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Design, Verification and Implementation of Enhanced PKM WiMAX Authentication Protocol

    Worldwide Interoperability for Microwave Access (WiMax/IEEE 802.16), is new technology based on wireless metropolitan area network. Privacy Key Management (PKM) protocol is responsible for providing the secure distributions of keying data from Base Station (BS) to Subscriber Station (SS). PKMv1, PKMv2, and enhanced PKMv1 described with formal analysis and verified...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Design and Development of a Framework to Mitigate DoS/DDoS Attacks Using IPtables Firewall

    A DoS (Denial of Service) attack is characterized by an explicit attempt to prevent the legitimate use of a service. These attacks overwhelm the processing or link capacity of the target sites by saturating them with bogus packets. Such attacks can seriously disrupt legitimate communications. These attacks can disrupt the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Mar 2013

    Data Classification for Recognizing the Web Application

    In this paper, the authors present a solution to distinguish the different applications running on port 80 with HTTP protocol; from that helping firewall to detect the attack and to try to prevent it. This paper is relatively a typical problem; by there are many different applications such as game,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2011

    Performance Evaluation and Improving Bandwidth Utilization of AODV Protocol by Finding Hidden Terminals in Wireless Networks

    Ad-Hoc on demand distance vector routing protocol is designed for use in Ad-Hoc mobile networks. AODV is an on-demand distance vector routing protocol that determined a route to a destination only when a node wants to send a packet to that destination. This paper focuses to improvement of AODV protocol...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2011

    Multi-Factor User Authentication in Wireless Sensor Networks

    Wireless Sensor networks are a new wireless networking paradigm for the mobile hosts. Wireless Sensor networks are an autonomous system that is made up of collaborative mobile nodes. Wireless Sensor networks can be dynamically setup without relying on any pre-existing infrastructure. Implementing the public key user authentication is a challenging...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2011

    Providing Internet Connectivity and QOS of Reactive and Proactive Protocols Using Gateway Discovery in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a collection of nodes which are connected by wireless links. MANET is a self configuring network in which nodes are free to move. This paper used two ADHOC routing protocols i.e. reactive and proactive Protocols. In this paper, the authors have use only two...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2011

    A New Watermarking Approach - Combined RW/CDMA in Spatial and Frequency Domain

    In this paper, the authors study some watermarking methods and the comparison result of their combination, the first one is based on the CDMA (Code Division Multiple Access) in frequency domain DWT(Discrete Wavelet Transform) noted CDMA-DWT,CDMA in DCT(Discrete Cosine Transform) noted CDMA-DCT and CDMA in Spatial Domain noted CDMASD and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jul 2011

    Secure Data Collection in Wireless Sensor Networks Using Random Routing Algorithms

    Wireless Sensor Networks make it possible to send secure data from source to destination. If applied to network monitoring data on a host, they can used to detect compromised node and denial-of-service is two key attacks. In this paper, the authors present four "Multi-path randomized routing Algorithm" a method to...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2011

    Software Testing of GPS Data Processing

    There are different set of software for GPS data processing. Every manufactures of GPS receivers produce their own software for processing the observed field data in order to obtain adjusted results. In most cases these set of software are protected or secured so it cannot be used to process data...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2012

    Intelligent Wireless Sensor Network Management Based on a Multi-Agent System

    The main goal of Wireless Sensor Networks (WSN) is to gather data from their environment. This gathering should take into consideration the life of the battery of each sensor node to maintain the continuity of the network. The technology of Multi-Agent System (MAS) can be adopted in large scale WSN...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2012

    Network Selection Decision Based on Handover History in Heterogeneous Wireless Networks

    In recent years, the mobile devices are equipped with several wireless interfaces in heterogeneous environments which integrate a multitude of Radio Access Technologies (RAT's). The evolution of these technologies will allow the users to benefit simultaneously from these RAT's. However, the most important issue is how to choose the most...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Design a Secure Multiparty Computation System for Privacy Preserving Data Mining

    Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed even to the party running the algorithm. The aim of a secure multiparty computation task is for the participating parties to securely compute some function of their distributed and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Performance Analysis of Optimized FEC Based on IEEE 802.16d

    WiMAX is one of the most promising IEEE 802.16 standards. This paper carries out a study of IEEE 802.16d OFDM layer and mainly concentrates on the Forward Error Correction (FEC) based on IEEE 802.16 standard. Forward error correction coding is a system of error control for data transmission. FEC is...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Distribution of Nodes on Square Method for Wireless Sensor Networks

    This paper focuses on distribution of nodes on square method for wireless sensor networks by using multidimensional scaling algorithm for position estimation. Nowadays Wireless networking is used to meet a variety of needs. Smart environments represent the next evolutionary development step in buildings, utilities, industrial, scientific, medical, home, shipboard, and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Emerging Trends in Wireless Multimedia Technologies: IRIS

    In the emerging trends in wireless multimedia services and technologies, the term biometrics is gaining increasing attention in these days. Security systems having realized the value of biometrics, specially, biometrics is used for two basic purposes to verify or identify users. The use of fingerprints, facial characteristics and other biometrics...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Neural Network Model Based Sleep Down Power Control for Mobile Ad-Hoc Network

    Power control is needed to exchange messages between any pair of neighboring nodes. Mobile ad-hoc network capacity is increasing by reducing the transmit power level of nodes in network. Transmit power control depends on the protocol from physical to transport layers, including the three important parameters like data transfer rate,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Service Oriented Architecture-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services

    The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented Architecture (SOA)...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    A Comparative Study of Handoff Schemes in Vehicle to Infrastructure Using Mobile WiMAX

    With the increase in user mobility, there is need for seamless handover when mobile applications and services are being used especially in the context of vehicular Ad-Hoc NETworks (VANET), in order to enhance the user experience thus affecting the quality of service. This paper looks at VANET with WiMAX with...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    Towards a Perspective of Web Application Vulnerabilities and Security Threats

    The rapid and tremendous growth of Information and Communication Technology (ICT) has increased access to web applications. This increased access has paved the way for disadvantageous security and vulnerable threats in the form of attacks in web applications. Various detection and prevention techniques have been proposed by researchers in the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    Performance Evaluation of ATM Networks With Round Robin and Weighted Round Robin Algorithm

    The Asynchronous Transfer Mode (ATM) Network is believed to be capable of supporting various services with drastically different traffic characteristics and Quality of Service (QoS) requirements. The deployment of integrated services with a broad range of burstiness characteristics and their integration through statistical multiplexing has focused a great deal of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // May 2013

    A Survey on Caching, Replication and Crowdsourcing in Mobile Environment

    In this new era of technology, the mobile devices are available with various features. The main functionality of the mobile devices became effective information sharing i.e. information access on every finger touch, which makes the whole world small. The information sharing is done through various platforms like social networking, cloud...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Performance Analysis of Cluster Based Secure Multicast Key Management in MANET

    Mobile Ad-hoc NETwork (MANET) is a group of wireless nodes join together to form a network without a defined architecture. It is formed dynamically as the nodes are mobile in nature. This characteristic of MANET could lead to insecure information exchange. Applications in Mobile Ad-hoc NETworks (MANET) such as military...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Performance Degradation of Heterogeneous Wireless Sensor Network in the Presence of Non Cooperative Nodes

    Recently Wireless Sensor Networks (WSN) has gained research interest for remote area monitoring and tracking in unattended environments. WSN may be heterogeneous to provide resources and aggregation of resources will be helpful for efficient distributed computing. Sensor nodes in WSN are used to collect application specific data, perform some pre...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    A Survey on Software Security Testing Techniques

    This paper briefs a survey on software security techniques. Software security testing is not the identical as testing the correctness and competence of security functions implemented by software, which are most frequently verified through requirements-based testing. These tests are important; they expose only a small piece of the depiction needed...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Face and Gait Fusion Methods: A Survey

    Biometric authentication of a person is highly challenging and complex problem. Face and gait identifications in video have received significant attention. Consequently, their identification problems have challenges due to their large varying appearances and high complex pattern distributions. However, the complementary properties of these two biometrics suggest fusion of them....

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    An Assessment on Active Queue Management in Mobile Ad-Hoc Network

    The RED queue management algorithm achieves high throughput and low average delay by detecting and avoiding the incipient congestion. The detection of incipient congestion is based on calculation of average queue length and RED parameter settings. To avoid the congestion in the network, operators should have a priori estimations of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    New Algorithm for SIP Flooding Attack Detection

    Voice over Internet Protocol (VoIP) services are based on standardized and open technologies (i.e., SIP, H.323) using servers reachable through the Internet, implemented in software and provided often over general purpose computing hardware. Therefore, such services can suffer from various security threats as denial of service attacks. In this paper,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    The Switch Hierarchical Network Design Model (SHiNDiM): A Mechanism for Identifying and Determining the Correct Switch for the Appropriate Position in the Network Layer

    Designing and developing a reliable and stable network required installing the right switches in the correct positions of the hierarchical network layers. The identification, acquisition and determination of the right switches required the expertise of highly skilled and qualified network Engineers. However, employing and maintaining such expertise in some of...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Design, Verification and Implementation of Enhanced PKM WiMAX Authentication Protocol

    Worldwide Interoperability for Microwave Access (WiMax/IEEE 802.16), is new technology based on wireless metropolitan area network. Privacy Key Management (PKM) protocol is responsible for providing the secure distributions of keying data from Base Station (BS) to Subscriber Station (SS). PKMv1, PKMv2, and enhanced PKMv1 described with formal analysis and verified...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2013

    Design and Development of a Framework to Mitigate DoS/DDoS Attacks Using IPtables Firewall

    A DoS (Denial of Service) attack is characterized by an explicit attempt to prevent the legitimate use of a service. These attacks overwhelm the processing or link capacity of the target sites by saturating them with bogus packets. Such attacks can seriously disrupt legitimate communications. These attacks can disrupt the...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2013

    Chaotic Encryption Based PGP Protocol

    E-mail service is one of the most important Internet services. E-mail security includes confidentiality, authentication, message integrity, non-repudiation. Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extension (S/MIME) are email security protocol. They are used to provide security services for email system. PGP is widely used as de facto protocol...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2013

    Performance Evaluation of Different Topologies for Network Coding in Adhoc Network

    Network Coding is a new field for research, which has been growing rapidly. Its ability for improving network throughput and robustness enhancement. Hence the allow coding at intermediate nodes between the source and the receivers in one or multiple communication sessions. In the paper a simulation of different topologies and...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2013

    Analyzing the Performance of MAODV, ODMRP, MOSPF and PIM in Mobile Adhoc Networks

    Mobile ad hoc networks are flexible networks consisting of nodes which are mobile and without a wired infrastructure. Due to its dynamic topology, it supports upcoming group applications like spontaneous joint activities and emergency operations. Different multicast routing protocols have been proposed for ad hoc networks each having certain levels...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Feb 2013

    Signal Losses and Allowable Optical Received Power Prediction Based on Different Visibilities for Optical Wireless Communication Links

    Infrared wireless communication possesses two main attractive advantages over its radio frequency counterpart, namely the abundance of unregulated spectrum in 1.3m - 1.55m region and the ease with which the infrared radiation can be confined. Integrating microwave electronics and optics, it is possible to provide wideband communication services but it...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2013

    Effect of Mobility Patterns on VoIP QoS in Mobile WiMAX

    VoIP over Mobile WiMAX provides high data rate voice connectivity to high speed mobile as well as to fixed users. Voice over Internet Protocol (VoIP) enables the transport of voice data over internet protocol base networks. The WiMAX mobile network provides data services to both mobile as well as pedestrian...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Apr 2011

    Wireless Sensor Networks: A Study on Congestion Routing Algorithms

    Data's generated in Wireless Sensor Networks may not all alike, some data's are more important than other data's and they may have different delivery requirements. If congestion occurs in the Wireless Network, some or more important data's may be dropped. But in the authors' project they handle this problem by...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Sep 2011

    Analysis and Study of Denial of Service Attacks in Wireless Mobile Jammers

    Nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such attacks can be very easily accomplished using off-the shelf equipment. To give a simple example, a malicious node can continually transmit a radio...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Network Intrusion Detection System Using KMP Pattern Matching Algorithm

    Intrusion detection technology can help the system to deal with network attacks extend the security management ability of the system manager and increase the integrality of information security foundation structure. Intrusion Detection System (IDS) is a device (or application) that monitors network and/or system activities for malicious activities or policy...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    QoS Based on Ant Colony Routing for Wireless Sensor Networks

    The Wireless Sensor Networks (WSNs) are composed of nodes communicating over a wireless media, without the need for physical infrastructure. In this type of topology, all nodes cooperate to ensure the proper management of the network (control, routing, etc.). Fully distributed nature of such networks is the problem of performance...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Secured Secret Sharing Over Single Path in VoIP With Consistent Data Transfer

    Voice over Internet Protocol (VoIP) is a new fancy and up growing technology. A major change in telecommunication industry is VoIP. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss,...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Performance Modeling of Distributed Load Balancing Algorithm Using Neural Networks

    This paper presents a new approach that uses neural networks to predict the performance of a number of dynamic decentralized load balancing strategies. A distributed multicomputer system using any distributed load balancing strategy is represented by a unified analytical queuing model. A large simulation data set is used to train...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Jan 2012

    Stochastic Reward Nets Model for Time Based Software Rejuvenation in Virtualized Environment

    Modern business has a 24x7 non-stop running and the availability of the business continuity for everything, from everywhere, at all time is a growing requirement. System outages are more often due to software fault, than hardware fault. Software availability is one of the weakest links in system availability. Several studies...

    Provided By International Journal of Computer Science and Telecommunications

  • White Papers // Dec 2011

    Indoor Multipath Wireless Channel Experimental Characterization Utilizing Time Domain Techniques

    In this paper an experimental characterization of a typical indoor wireless propagation channel is performed. This channel characterization is needed for short range applications (

    Provided By International Journal of Computer Science and Telecommunications