International Journal of Computer Science Engineering and Technology

Displaying 1-40 of 128 results

  • White Papers // Dec 2014

    Comparative Study on SPOON and SimBet Routing in Disconnected MANETs

    Recent advances in portable computing and wireless technologies are opening up exciting possibilities for the future of wireless of wireless mobile networking. A Mobile Ad hoc NETwork (MANET) consist of mobile platform which are free to move arbitrarily. They are mainly developed for connected MANETs, in which end-to-end connectivity among...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Detail and Comparative Study on WSN Security Architectures

    Wireless Sensor Network (WSN) most widely growing technology in network due to this WSN well known technology among the research community people. WSN having enormous sensing devices to sensing the necessary information from current environmental scenario and transmit it to particular place or user. In WSN transmitting the obtained data...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Assessment of Manifestation of Agile Methodology and Computing

    Agile methodology is a modern approach in software process to achieve a common business goal. In today's business environment, normally organizations choose to deliver the projects very fast. They also require adjusting as well as adapting to changing environments. In this regard, traditional software methodologies fail to achieve these requirements....

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Network Evolution in 3G / 4G: Applications and Security Issues

    During the 20th century, the key technology was information gathering, processing and distribution. This total technology will depend based on the network systems which are nothing but grouping of systems that should be controlled by a server. In business and home applications, mobile users, and in all social issues the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Approaches and Scenarios to Combat Cyber Crime

    In the recent day's usefulness and importance of the internet has become a new crime tool. This paper focuses on different types of cyber crimes namely: phishing, email spoofing and cyber pornography. It provides a review of cyber crimes and the means to protect from such crimes. The paper looks...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Dec 2014

    Performance Comparison Between IPV4 AND IPV6

    The enormous growth of the internet and the way the addresses were assigned (classes A, B and C), resulted in a serious lack of addresses. There are several methods that avoid the total run out of addresses: PPP/DHCP (address sharing), CIDR (Classless Inter-Domain Routing) and NAT (Network Address Translation), but...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    Performance Evaluation of LTE-Advanced Channel Estimation Techniques in Vehicular Environments

    In this paper; two linear channel estimation techniques, Least Square (LS) and Minimum Mean Square Error (MMSE), are studied for the downlink of 3GPP LTE-A system which is based on MIMO-OFDM technology. The performance of the system is evaluated using different transmission schemes (Transmit Diversity (TxD) and Open Loop Spatial...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    Trust Computation Model for Secure Data Aggregation (TCMSDA) in Wireless Sensor Networks

    A wireless sensor network consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. In the wireless sensor networks, data aggregation scheme is used to reduce the large amount...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    A Survey on Approaches to Improve Quality of Fingerprint Image and Template Security

    A biometric is a distinct biological trait that can be used to recognize a person. Fingerprints have been used for over a century and are the most widely used for user identification. Fingerprint identification is commonly employed in forensic science to support criminal investigations and in biometric systems such as...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Nov 2014

    A Case Based Study to Identify Malicious Node in Packet Routing

    MANET is a standalone ad hoc network with a system of mobile nodes interfacing without any centralized infrastructure. Generally, in the network layer of such a network, there are more possibilities for an attacker to observe traffic and inject themselves into the transmission path between the source and destination. Hence,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Oct 2014

    A Study on Primary User Emulation Attack in Cognitive Radio Networks

    The Federal Communication Commission (FCC) defined Cognitive Radio (CR) as the radio that can change its transmission parameters based on interaction with the environment in which it operates. CR is an emerging technology in wireless communications. Based on their operating environment CRNs can dynamically reconfigure their characteristics. So that many...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Oct 2014

    Survey on CPAL: A Conditional Privacy Preservation Authentication with Access Linkability for Roaming Service

    Owing to tremendous development in wireless technology, user mobility has become an important network features. Roaming service helps to enable the wireless device kept connected to a network without breaking connections. With this new emerging technology the requirement of ubiquitous accessing can be successfully achieved, for example IOT (Internet Of...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Oct 2014

    Android L - The Latest Android Version 5.0

    Lollipop is the 13th major version of Android. Android 5.0 i.e. Lollipop release on 15th October 2014. It's the latest version of Android. It has gone through lot of enhancements and many API's is included in it. One of the most prominent changes in the Android Lollipop is the redesigned...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2014

    Expert System to Troubleshoot the Wireless Connection Problems

    Expert system is an important method to help using the expertise of the human in more than one place in high demanding fields. In this paper, an expert system was designed to troubleshoot the wireless connection problems and reach an accurate decision about the cause. Java and Prolog used connected...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2014

    Review of CBIR System

    With the advent of technology and multimedia information, digital images are increasing very quickly. Various techniques are being developed to retrieve/search digital information or data contained in the image. Traditional text based image retrieval system is not plentiful. Since it is time consuming as it require manual image annotation. Also,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    Efficient Security Solution for Privacy-Preserving Cloud Services

    The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies In this paper, the authors present a novel privacy-preserving security solution for cloud services. They deal with user identification and secure communication. Their solution provides...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    Performance Testing and Improvement in Agile

    Web performance testing is a must for every application in almost all the cases where reliability, scalability and turnaround time is at stake. Not considering these parameters related to the user application can translate to heavy losses in terms of brand and finances. The generic model of process to follow...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    A Secure Routing Protocol for MANET

    Mobile Ad hoc NETworks (MANETs) have become a remarkable technology for wireless communication in recent years because of its critical and emergency situations that may cover. Routing protocols for ad hoc network are vulnerable to various types of attack. Security is an essential issue in MANET due to open medium...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jul 2014

    A Study on Web Services Security

    A Web services have appeared as a new Web-based technology concept for trading information on the Internet using platform-neutral standards, such as XML and adopting Internet-based procedure. In recent times, Web services have initiate vast attractions in both merchants and researchers. It has become a promising technology to design and...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Virtualization, Resource Allocation and Security Measures in Cloud Computing

    Cloud computing mainly aims for the next generation data centers and it also enables the application service providers to lease data center capabilities for deploying applications depending on user QOS requirements and different composition configuration as well as deployment requirements, these are related cloud applications. Cloud computing also provides virtualization,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Documenting Agile Project Knowledge: A Review of Knowledge Capture for Agile Practices

    In the current agile project management environment of fast-paced, iterative changes, capturing appropriate project knowledge without affecting the light, iterative method is critical. The goal is matching light, streamlined documentation approaches to agile practice while avoiding excessive documentation. This intent includes knowledge capture specifically designed for a specific audience. This...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2014

    Enhance the Data Security Using PGP & DES in MANET

    The goal of security solutions is to provide security services, such as authentication, confidentiality, integrity, and availability to mobile users. In order to enhance the security various algorithms were proposed, such as International Data Encryption Algorithm (IDEA), Data Encryption Standard (DES) & Pretty Good Privacy (PGP) etc. Individually each algorithm...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Integration of Security Issues in Multi Cloud Computing Environment

    A proposed multi-cloud computing framework allows dynamic resource sharing among cloud-based system, addressing trust, policy, and privacy issues without pre-established collaboration agreement. Multi-cloud typically consists of service providers (or admin), infrastructure providers, and service users (or clients). Service provider (or admin) delivers applications as services to the service users (or...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Data Sharing in the Cloud Using Distributed Accountability

    Cloud computing enables highly scalable services which to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Frameworks of Privacy-Utility Tradeoffs in Databases

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. Online offerings such...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Review on DDoS Attack Traceback Mechanism in MANET

    Mobile ad-hoc network is a collection of node which is self-configuring, decentralized, framework-less mobile network. Due to open nature of the network it is easily vulnerable to various attacks. The major security threat on MANET is a DDoS attack. DDoS attack has the ability to create huge amount of unwanted...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Reliable Transport Protocol Design for Energy- Efficient Wireless Sensor Networks

    New wireless sensor network applications (e.g., military surveillance) require higher reliability than a simple best effort service could provide. Classical reliable transport protocols like Transmission Control Protocol (TCP) are not well suited for wireless sensor networks due to both the characteristics of the network nodes (low computing power and strong...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Transversal Design for Wireless Sensor Networks Using Security Enhanced Key

    Security is an indispensable concern in Wireless Sensor Network (WSN) due to the presence of potential adversaries. For secure communication in infrastructure less sensor nodes various key predistribution have been proposed. In this paper, the authors have evaluated various existing deterministic, probabilistic and hybrid type of key pre-distribution and dynamic...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Reconfigurable Multi- Band Antenna Using RF MEMS

    The design methodology, analysis and characterization of a Radio Frequency Micro ElectroMechanical Systems (RF MEMS) based on reconfigurable antenna operating in wireless communications are been presented in this paper. Now-a-days, multi-band antennas have became very important in the applications of Wireless Local-Area Networks (WLANs) which are been employed for different...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Security of Graphical Passwords Using PCCP

    The people are well aware about problems persists in typically text-based passwords. Users generally choose memorable passwords, that are easy for attackers to guess, but the strong system generated passwords are difficult to remember. So a password authentication system should emphasis on maintaining high password strength on one hand and...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Mesh based and Hybrid Multicast Routing Protocols for Mobile Ad hoc Networks: Current State of the Art

    Producing multi-hop routing in multicast routing protocols for MANETs under host mobility and bandwidth constraint is critical challenge. Multicast routing plays a significant role in MANETs. In recent years, various multicast routing protocols with distinguishing feature have been newly proposed. In order to provide a comprehensive understanding of these multicast...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    A Proposed Modified Approach to Corruption Control for TCP in Mobile Ad-Hoc Networks

    Among the two transport layer protocols, TCP is the reliable protocol that performs well in traditional networks where the main reason for packet loss is congestion. Wireless networks also suffer from some losses due to bit errors, hidden terminals etc. In response to all these losses TCP invokes congestion control...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    A Survey Based on Fingerprint, Face and Iris Biometric Recognition System, Image Quality Assessment and Fake Biometric

    A biometric system is a computer system, which is used to identify the person on their behavioral and physiological characteristic (for example fingerprint, face, iris, key-stroke, signature, voice, etc). A typical biometric system consists of sensing, feature extraction, and matching modules. But now-a-days biometric systems are attacked by using fake...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Secure SMS System for E-Commerce Applications

    SMS is a very popular wireless service throughout the world. In this paper, a simple e-commerce application for shopping is presented with implementing a new version of Diffie-Hellman protocol, to insure mutual authentication between client and server along with exchanging key securely through unsecure channel. The proposed system provides the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Hamming Code Detecting and Correcting Errors in Credit Cards Using Neural Networks

    In this paper, the authors discuss about hamming code detecting and correcting errors in credit card information such as card number, expiry date and CVV number. Card can store the card holder information in chip. Chip transmit the card holder's information in binary form. The detection and correction of error...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Theoretical Study of Ambient Noise Cancellation for Mobile Phones

    All of the people have experienced trying to make a mobile phone call from a noisy street, crowded restaurant or train station where the background noise can make it impossible to hear the incoming call. It can be worse when the person next to the user in these situations is...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Performance Analysis of TCP Congestion Control Algorithms

    The demand for fast transfer of larger volume of data, and the deployment of the network infrastructures is ever increasing. However, TCP is the dominant transport protocol of today, does not meet this demand because it favors reliability over timeliness and fails to fully utilize the network capacity due to...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Private Content Based Multimedia Information Retrieval Using Map-Reduce

    Today's large amount of variety multimedia information like audio, video and images are massively produced through mic, digital camera, mobile phones and photo editing software etc. In these paper the authors proposed a solution for a large database of images which provides secure, efficient and effective search and retrieve the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    Design of Stuck at Fault Testable Conservative Logic Based Flip-Flops and Its Application Circuits

    In this paper, the authors deal with the testable design of conservative logic based sequential circuits by using two test vectors. The conservative logic based sequential circuits are built from the reversible gates. This reversible or information lossless circuits have extensive applications in quantum computing, optical computing, as well as...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    A New Low-Power 1-Bit CMOS Full-Adder Cell Based on Multiplexer

    In this paper, the authors present a novel low-power and high-speed 1-bit full-adder, which is designed based on pass transistor and TG logics. The main advantage of this design is low propagation delay and low-power consumption, which leads to achieving lower PDP than others. Intensive HSPICE simulation shows that the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improve the Performance of LBAC-IAPP by Using Proactive Context Caching

    In wireless networks, continuous connectivity which allows user mobility and maintains the secured network utilization is one of the most important requirements. WLANS are widely used in business, governments, education and public. In order to establish wireless LAN with continuous connectivity, the authors need to employ additional mechanisms like IAPP,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Simulation Based Performance Analysis of Ad Hoc Routing Protocols in Various Moving Trajectories

    Few characteristics of a Mobile Ad hoc Network, such as dynamic topology and shared wireless medium, pose various security challenges. This paper focuses on the performance investigation of reactive and proactive MANET routing protocols, namely, AODV and OLSR, under various the paths and trajectories. Network performance is evaluated in terms...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2011

    Improved Receiver-Based Algorithm for Resourceful Broadcasting in Portable ADHOC Networks

    Two efficient broadcasting algorithms based on 1- hop neighbor information is implemented here, i.e. Sender-based broadcasting algorithm and receiver-based broadcasting algorithm. The sender-based broadcasting algorithm selects a subset of nodes to forward the message. An efficient sender-based broadcasting algorithm proposed here is based on 1-hop neighbor information where the number...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    An Approach of Cryptography for Web User Authentication Using Secure Remote Password Protocol

    In this paper, the authors describe generation of a crypt key for user of web application using SRP techniques for the purpose of secure authentication in web. A numbers of web sites offer different kinds of users in worldwide to access web application using unique user name and corresponding a...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    Integration of Security Issues in Multi Cloud Computing Environment

    A proposed multi-cloud computing framework allows dynamic resource sharing among cloud-based system, addressing trust, policy, and privacy issues without pre-established collaboration agreement. Multi-cloud typically consists of service providers (or admin), infrastructure providers, and service users (or clients). Service provider (or admin) delivers applications as services to the service users (or...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Data Sharing in the Cloud Using Distributed Accountability

    Cloud computing enables highly scalable services which to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. While enjoying the convenience brought by this...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2014

    A Study on Frameworks of Privacy-Utility Tradeoffs in Databases

    Ensuring the usefulness of electronic data sources while providing necessary privacy guarantees is an important unsolved problem. This problem drives the need for an analytical framework that can quantify the privacy of personally identifiable information while still providing a quantifiable benefit (utility) to multiple legitimate information consumers. Online offerings such...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    Design of Stuck at Fault Testable Conservative Logic Based Flip-Flops and Its Application Circuits

    In this paper, the authors deal with the testable design of conservative logic based sequential circuits by using two test vectors. The conservative logic based sequential circuits are built from the reversible gates. This reversible or information lossless circuits have extensive applications in quantum computing, optical computing, as well as...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Sep 2012

    Generic Platform Independent Operating System Utility

    This generic platform independent OS utility is an interface that is related with the operating system and the end user. The role the interface plays is that of a graphical interface that comes up with command line where a pre defined set of commands are allowed to be executed. The...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2014

    A New Low-Power 1-Bit CMOS Full-Adder Cell Based on Multiplexer

    In this paper, the authors present a novel low-power and high-speed 1-bit full-adder, which is designed based on pass transistor and TG logics. The main advantage of this design is low propagation delay and low-power consumption, which leads to achieving lower PDP than others. Intensive HSPICE simulation shows that the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2013

    Detection of DDoS Attacks Using Source IP Based Entropy

    There are about nine hundred million people, who use internet now-a-days. They use the internet to communicate with each other and all over the world, business-men can do their work over the internet, and there is much more to it. One of the major security problems in the current Internet,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    Mobile Ad Hoc Networks: A Comparative Study of QoS Routing Protocols

    Mobile Ad hoc NETworks (MANETs) is a class of wireless networks that have been researched extensively over the recent years. MANETs do not require the support of wired access points or base stations for intercommunication. A mobile ad hoc network, unlike a static network, has no infrastructure. This paper presents...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    Tracking Multiple Objects in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) depends on the algorithms and protocols for communication and computation. In this paper, the authors implement sensors that sense the environment actively by emitting energy and measuring the reflected energy, a novel collaborative sensing scheme is used to sense multiple targets and high maneuvering targets in...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    Performance Evaluation of Ad Hoc Network Routing Protocols with NS2

    Ad-hoc networks consist of various decentralized nodes without any support of central administration and have no any physical links and not follow particular topology due to the behavior of node with frequent mobility of nodes. Protocol suite of this network consists of various routing protocols which are specifically designed mobile...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    Evaluation of Handover Process in WIMAX Networks

    Worldwide interoperability for Microwave Access (WiMAX) is a technology based on IEEE 802.16 standards. WIMAX is to be used as the solution for the last mile access for both fixed and mobility applications (mobile users). IEEE 802.16 standard was developed to deliver Non Line Of Site (NLOS) connectivity between a...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2012

    Energy-Efficient Routing in Wireless Sensor Networks to Improve the Life Time of Sensor Nodes

    Energy-efficient routing is a critical problem in multihop WSN due to the severe power consumption of wireless nodes, the research on routing algorithm is pivotal in the architecture of WSN. This paper analyzes the implementation and existing issues in LEACH. Specifically for node energy and the network lifetime, it proposes...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Mar 2012

    Improving QoS in 3G Wireless Mobile N/W Using Call Admission Control Scheme

    Call admission control schemes play more important role in wireless cellular networks. They are used for achieving some desired quality of service parameters. The design of call admission control algorithms for mobile cellular networks is especially challenging given the limited and highly variable resources, and the mobility of users encountered...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Feb 2012

    An Adaptive Cross-layer Mapping Algorithm for Multiview Video Coding over IEEE 802.11e WLANs

    In this paper, the authors propose an Adaptive Cross-layer Mapping algorithm for Multi view Video Coding (ACMMVC) over IEEE 802.11e Wireless Local Area Networks (WLANs). To support the varying Quality-of-Service (QoS) requirements of emerging applications, four Access Categories (ACs) have been defined in the IEEE 802.11e standard. Each AC has...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Feb 2012

    The Influence of Stable Theory on Cryptography

    Metamorphic information and small talk have garnered profound interest from both end-users and futurists in the last several years. Many theorists would agree that, had it not been for the unproven unification of 802.11b and IPv7, the simulation of I/O automata might never have occurred. After years of essential research...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Feb 2012

    Routing Protocols in MANET's

    Mobile Ad-hoc NETworks (MANETs) are characterized as networks without any physical connections. In these networks there is no fixed topology due to the mobility of nodes, interference, multipath propagation and path loss. Hence a dynamic routing protocol is needed for these networks to function properly. Many routing protocols have been...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Feb 2012

    Peer to Peer Reputation Management

    Every year, the Internet and, by extension, the web gets bigger and better, as the internet takes an increasingly central role in the authors' communications infrastructure, the slow convergence of routing protocols after a network failure becomes a growing problem. To assure fast recovery from link and node failures in...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    Encryption, Decryption and Error Detection using Finite State Transducers and their Inverses

    Finite state transducers, convert a given input sequence into another output sequence using a finite state machine. In this paper, the authors are using the Moore model where the present output symbol depends only on the present state. Also, the Finite State Transducer (FST) is designed for invertibility. In this...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jan 2012

    IRIS Recognition and Identification System

    A biometric system uniquely identities and authenticates humans based on their physical or behavioral features. Iris recognition is one of the most reliable methods of biometric authentication that recognizes a person by pattern of the iris. No two irises are alike - not between identical twins, or even between the...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2012

    A New Genetic Approach to Cryptography and Steganography

    With the development of network techniques the problem of network security becomes more and more important. The use of Word Wide Web has grown extremely in the past few years. Furthermore, many end users can easily use tools to synthesize and edit multimedia information. Thus, security has become one of...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2012

    Monitoring Rail Traffic Using Wireless Sensor Network (WSN)

    Due to the fact that most rail lines located in mountainous or desert having a monitoring system to check the safety of these lines is very important. According to performance of wireless sensor networks, it is very useful in monitoring system of rail lines. In this paper, an algorithm Failure...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Jun 2012

    Performance Evaluation of On Demand HRP in MANETS

    In mobile ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources used by the mobile nodes. The absence of any central coordinator makes the routing a complex one compared to cellular networks. The ad hoc on demand Hybrid Routing Protocols (HRP) routing algorithm is a...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2012

    Optimum Placement of Additional Sink Nodes in a Wireless Sensor Network

    A new heuristic algorithm for solving the conditional p-center problem is described. In the new algorithm, the initial locations of the p additional sink nodes are selected based on the greedy algorithm. Then the clusters are grown iteratively around the sink nodes which act as the seeds. In successive iterations,...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2012

    Visualizing Survivability Aspects in WDM Networks

    The explosive growth of Web-related services over the Internet is bringing millions of new users online, thus fueling an enormous demand for bandwidth. The impetus focus is on to provide high data transfer and utilization of high bandwidth, so the era of computer networks completed a journey from co-axial, twisted...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // May 2012

    Wireless Sensor Networks Application and Control in Industrial System: A Study Report

    In this paper, the authors provide an application on implementing Wireless Sensor Network (WSN) technology on industrial system monitoring and control. First, the existing industrial applications are explored, following with a review of the advantages of adopting WSN technology for industrial control. Then, challenging factors influencing the design and acceptance...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2012

    Affordable Quantum Cryptography System for Mobile Devices

    The today's technology allows the people to design simple quantum cryptography circuits embeddable in mobile devices to ensure the maximum security in money transfer and controlled access. It is known that the quantum cryptography protocols allow a virtually perfectly secure key generation and exchange process. This technology uses the quantum...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2012

    Comparative Analysis of IEEE 802.11b At 2 Mbps &11 Mbps

    The IEEE 802.11 wireless local area standard, WLANs, available in various variants as a/b/g, is one of the most popular wireless standards used in the market today. In this paper, an attempt has been made to analyze and compare the variant IEEE 802.11b using a smart Call Admission and Rate...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2012

    Intelligent Communicator (Android Application)

    Recent years have witnessed a meteoric increase in the adoption of Smartphone's. Their popularity can be attributed to the incredible functionality and convenience Smartphone's offered to end users. In fact, existing mobile phones are not simply devices for making phone calls and receiving SMS messages, but powerful communication and entertainment...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    Mesh based and Hybrid Multicast Routing Protocols for Mobile Ad hoc Networks: Current State of the Art

    Producing multi-hop routing in multicast routing protocols for MANETs under host mobility and bandwidth constraint is critical challenge. Multicast routing plays a significant role in MANETs. In recent years, various multicast routing protocols with distinguishing feature have been newly proposed. In order to provide a comprehensive understanding of these multicast...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2012

    Keyword based Search Engine for Web Applications Using Lucene and JavaCC

    Past few years IT industry has taken leap towards developing Web based applications. The need aroused due to increasing globalization. Web applications has revolutionized the way business processes. It provides scalability and extensibility in managing different processes in respective domains. With evolving standard of these web applications some functionality has...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Apr 2014

    A Proposed Modified Approach to Corruption Control for TCP in Mobile Ad-Hoc Networks

    Among the two transport layer protocols, TCP is the reliable protocol that performs well in traditional networks where the main reason for packet loss is congestion. Wireless networks also suffer from some losses due to bit errors, hidden terminals etc. In response to all these losses TCP invokes congestion control...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Sep 2013

    Event Region Refinement in A Grid-Based Wireless Sensor Network using Repeated Spatial Interpolation

    An important application of a Wireless Sensor Network (WSN) is physical environment (temperature, humidity, rainfall etc.) monitoring over a large geographical area. The geographical area is mapped into regions of interest according to the application based on the measurement readings of the sensors. For example, a temperature monitoring system can...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Sep 2013

    A Study on Pollution Monitoring System in Wireless Sensor Networks

    Air pollution is one of environmental issues that cannot be ignored. The heavy transportation and urbanization result in the air pollutants concentrated in certain areas. Inhaling pollutants for a long time causes damages in human health. Traditional air quality monitoring methods, such as building air quality monitoring stations, are typically...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2013

    A Study on ASCENT in Wireless Sensor Networks

    The nodes will have to self-configure to establish a topology that provides communication under stringent energy constraints. ASCENT builds on the notion that, as density increases, only a subset of the nodes are necessary to establish a routing forwarding backbone. In ASCENT, each node assesses its connectivity and adapts its...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2013

    A Review of QoS in Wireless Sensor Networks

    The adoption of wireless sensor networks by applications that require complex operations, ranging from health care to industrial monitoring, has brought forward a new challenge of fulfilling the Quality of Service (QoS) requirements of these applications. However, providing QoS support is a challenging issue due to highly resource constrained nature...

    Provided By International Journal of Computer Science Engineering and Technology

  • White Papers // Aug 2013

    A Review of Power Aware Routing in Wireless Ad-hoc Networks

    This development of the efficient power aware protocol is the need of today's ad hoc networks. Although developing battery efficient systems that have low cost and complexity, remains a crucial issue. In order to facilitate communication within a mobile ad hoc network, an efficient routing protocol is required to discover...

    Provided By International Journal of Computer Science Engineering and Technology