International Journal of Engineering Science and Technology

Displaying 1-40 of 59 results

  • White Papers // Jun 2013

    An Efficient Framework for Enhancing Security in the Cloud Environment

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Security is considered to be one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud and also due to the...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2013

    A Spic-and-Span Gateway for Secure Data Storage in Cloud Computing Environment

    Cloud computing is a light weight methodology. The cloud based applications are accessed by the end user through the use of web browser or a light weight desktop. In recent year, cloud computing is a one of the great powerful luminous star in the universal IT industry. Spotlight of this...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2013

    Enhanced Energy Management in WSN Using LW Security Algorithms

    The sensor nodes are typically resource deficient with energy being the most critical of all the resources. There are usually several security requirements to protect a sensor network. These requirements should be considered during design of a security protocol, including confidentiality, integrity, and authenticity. An effective security protocol should provide...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2013

    Key Updation for the Dynamic Attributes in Cloud Computing for Competent User Retraction

    Companies are into the cloud and provide services on it. the increasing popularity of cloud computing draws attention to its security challenges, which are particularly worsen due to resource sharing. This technology is prone to security threats because of which the users want to trust their precious data. Several schemes...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Feb 2012

    Data Compression of Fingerprint Minutiae

    Biometric techniques have usual advantages over conventional personal identification technique. Among various commercially available biometric techniques such as face, fingerprint, Iris etc., fingerprint-based techniques are the most accepted recognition system. Fingerprints are trace or impression of patterns created by friction ridges of the skin in the fingers and thumbs. Steganography...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Extended I Frame Method for Video Traffic Smoothing

    Now-a-days, the use of video media has increased to a large extent, with increasing availability of Internet bandwidth. To reduce the amount of data transferred, the video information is compressed before transmission. This makes the video traffic to be very much bursty. The burstiness of the traffic makes if difficult...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Optimization of Capacitated Vehicle Routing Problem Using PSO

    This paper presents solution techniques for Capacitated Vehicle Routing Problem (CVRP) using metaheuristics. Capacitated Vehicle Routing Problem is divided into set of customers called cluster, and find optimum travel distance of vehicle route. The CVRP is a combinatorial optimization problem; Particle Swarm Optimization (PSO) technique is adapted in this paper...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Analytical Results for BER Performance of MIMO-Rake Receiver in WCDMA System

    The use of Rake Receiver in Wideband Code Division Multiple Access (WCDMA) system provides a unique and valuable means of combating the adverse effects of short-term multipath fading in mobile radio propagation environments. The transmitted signal bandwidth in WCDMA system is much larger than the coherent bandwidth of the channel,...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Research Survey on MIFARE With RFID Technology

    paper that discusses the evolving technology of MIFARE and its potential for replacing the existing RFID technology. Though RFID technology has several advantages there are several technical disadvantages of RFID. As RFID makes use of radio waves they are susceptible to interference and moreover memory is less and is devoid...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Distributed Performance Evaluation Tool for Inferring Router Packet Forwarding Based on Priority

    Packet based Weighted Fair Queuing (PBWFQ) in routers is one of the mechanisms commonly available to network operators. PBWFQ can have a considerable impact on the precision of network dimensions, the performance of applications and the efficiency of network troubleshooting procedures. Regardless of its potential impacts, no information on PBWFQ...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    A Min-Process Checkpointing Protocol for Deterministic Mobile Ad Hoc Networks

    The mobile ad hoc network architecture consists of a set of mobile hosts that can communicate with each other without the assistance of a base station. Nodes within each other radio range communicate directly via wireless links while these which are far apart rely on other nodes to relay messages....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    Stable and Reliable Broadcast Scheduling in Multi-Hop MANET

    This paper presents a broadcasting protocol called Stable Reliable Broadcast Scheduling (SRBS) designed for multi-hop wireless ad hoc networks. Due to multi-hop limited bandwidth and the dynamic changes of the network topology, the network performance is highly hindered. The SRBS enables bandwidth-efficient broadcasting in wide area network. The protocol was...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    Security Architecture of Cloud Computing

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    Path Loss Compensation Technique for Wimax Technology Based Communication System

    WiMAX is the most promising high speed wireless technology to provide necessary support with flexible Quality of Service (QoS). The authors have investigated the effect of various parameters such as signal frequency, base station antenna height, distance between base station antenna and subscriber station on path loss for WiMAX frequency...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    Implementing High Performance Lexical Analyzer Using CELL Broadband Engine Processor

    The lexical analyzer is the first phase of the compiler and commonly the most time consuming. The compilation of large programs is still far from optimized in today's compilers. With modern processors moving more towards improving parallelization and multithreading, it has become impossible for performance gains in older compilers as...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Aug 2011

    A Security Framework for Virtualization Based Computing Environment

    Virtualization in simple words refers to the way of running more than one operating system in a single machine at the same instance of time which is not possible in the a multi-booting operating system. With an advantage so many disadvantages are there, in this paper, the authors describe about...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    The Criteria Require for Cluster Head Gateway Selection in Integrated Mobile Ad Hoc Network

    A wireless ad hoc network consists of mobile nodes that move freely and communicate with each other using wireless links. Mobile wireless Sensor Networks are widely recognized as one of the most promising technologies in both academia and industry. An Adhoc network is a dynamic multi-hop wireless network established by...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Avoidance of Cochannel Interference in Dynamic Channel Allocation in a Broadband Fixed Wireless Access Network Using Modified Genetic Algorithm

    In this paper DCA using Modified Genetic Algorithm (MGA) is applied to a Broadband Fixed Wireless Access (BFWA) network that provides data services. The performance of the modified GA is compared using a simulation with other DCAs namely the Least Interfered (LI) and Channel Segregation (CS) and simple genetic algorithm....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Guard Against Cooperative Black Hole Attack in Mobile Ad-Hoc Network

    A mobile ad-hoc network is an autonomous network that consists of nodes which communicate with each other with wireless channel. Due to its dynamic nature and mobility of nodes, mobile ad hoc networks are more vulnerable to security attack than conventional wired and wireless networks. One of the principal routing...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Intelligent Polling System Using GSM Technology

    Voting is the foundation of a democratic system of government, whether the system uses direct or representative governance. To increase the efficiency and accuracy of voting procedures, computerized voting systems were developed to help collecting and counting the votes. For a variety of reasons, voters may be unable to attend...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Effective Load Balancing Algorithm for Grid Wireless Sensor Networks

    Routing is always a challenging issue in sensor networks due to the constraints such as memory, power and processing capabilities of the CPU. In this paper, the authors explore a load balancing algorithm for N x N grid sensor network. Here they assume an All to All communication mode. This...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Comprehensive Performance Analysis and Special Issues of Virtual Private Network Strategies in the Computer Communication: A Novel Study

    An Internet-based virtual private network uses the open, distributed infrastructure of the Internet to transmit data between corporate sites. VPNs using the Internet have the potential to solve many of the business networking problems. Virtual Private Networks provide an economical yet secure way to connect sites together and to provide...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Energy Efficent Routing Protocol in Wireless Sensor Network

    Wireless sensor networks consist of small battery powered sensor nodes with limited energy resources. The area of wireless sensor networks is now attractive in the research area due to its applications in many fields such as defense security, civilian applications and medical research etc. In wireless sensor networks, the important...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Analysis of Cipher Text Size Produced by Various Encryption Algorithms

    In the digital world, it is the need of the hour to secure the data communication from unauthorized access. Over the time a number of techniques and algorithms have came into operation for its security. This paper is done qualitatively to emphasize the need for securing the data as well...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    On Some Propagation Characteristics of Tropical Atmospheric and Cosmic Radio Noise

    Sources responsible for generating noise in the magnetospheric and ionospheric cavities with reference to the relative power levels in different frequency bands are examined. Some propagation characteristics of both atmospheric and cosmic radio noise as recorded at Kalyani have been examined. The characteristics obtained are compared with other reported results....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Bandwidth and Gain Increment of Microstrip Patch Antenna With Shifted Elliptical Slot

    This paper describes the increment in Bandwidth and Gain of Rectangular Microstrip Patch antenna with Shifted Elliptical slot. First the authors have designed a Rectangular microstrip patch antenna. After that an elliptical slot is cut inside a rectangular patch which is shifted towards right. The results of both the designs...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    The Image Level Tainting: A New Approach for Preventing SQL Injection Attacks

    A new approach for protecting Web applications-An Image level Tainting, involves comparing the SQL statements that includes the images viewed as characters in the user input with the Meta strings library, to prevent them if found any and protecting the web applications against SQL injection is discussed in this paper....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    An Approach to Extract Efficient Frequent Patterns From Transactional Database

    Frequent pattern mining is a heavily researched area in the field of data mining with wide range of applications. Mining frequent patterns from large scale databases has emerged as an important problem in data mining .A number of algorithms has been proposed to determine frequent patterns. Apriori algorithm is the...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Simulation and Analysis of Bb84 Protocol by Model Checking

    Quantum Cryptography or Quantum Key Distribution (QKD) is a technique to securely distribute a bit string, among two parties by using laws of quantum mechanics. Its security relies on foundations of quantum mechanics, where as classical cryptography relies on difficulty of certain mathematical problems that can not able to provide...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    A Method to Find Shortest Reliable Path by Hardware Testing and Software Implementation

    This paper is about shortest reliable path algorithms of routing in transportation networks. Efficient management of networks requires that the shortest route from one point (node) to another is known. It is often necessary to be able to determine alternative routes through the network, in case any part of the...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Implementation of Object Oriented Encryption System Using Layered Cellular Automata

    As the technology advances day by day, sharing of information through Internet is growing rapidly, which increases new information threats and vulnerabilities and hence the need to protect information to ensure its confidentiality, integrity, and authenticity require constant enhancements. Over the past two decades Cryptographic techniques are essential component of...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    A Modern Two - Phased System for On-Shelf Utility Mining on Web Transactions

    Utility mining has recently been an emerging topic in the field of data mining and so is the web mining, an important research topic in database technologies. Through the world wide web development, the web utility mining, which can be viewed as a mixed term of web mining & utility...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Performance Method of Assessment of the Intrusion Detection and Prevention Systems

    The Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS) are the latest tools of the security of the computerised data of a company although the evaluation of their performance and efficiency is important. In this paper, the authors tried to assess the performance of these tools with regard to the...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2011

    Comparison the Performance of Free-Space Optical Communication With OOK and BPSK Modulation Under Atmospheric Turbulence

    Free-Space Optical communications (FSO) propagated over a clear atmosphere suffers from irradiance fluctuation caused by small but random atmospheric temperature fluctuations. This results in decreased signal-to-noise ratio and consequently impaired performance. In this paper, the Bit Error Rate (BER) performance of Free Space Optical (FSO) communication systems employing On-Off Keying...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2011

    An Efficient Load Balancing Algorithm for Grid Computing Using Mobile Agent

    The development of Grid Computing technologies, dynamic resource sharing is becoming an increasingly important issue in the area of distributed, heterogeneous network. In this paper, an approach for dynamic runtime load balancing based on mobile agents is introduced. This involves a migration of active agents between hosts in order to...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2011

    Optimal Rate Based Image Transmission Scheme in Multi-Rate Wireless Sensor Networks

    In image transmission application over WSN energy efficiency and image quality are both important factor for joint optimization. The large size image transmission cause bottleneck in WSN due to the limited energy resources and network capacity. Since some sensor are in similar viewing directions the images they are capture likely...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2011

    Comparison of SQL Injection Detection Techniques Which Uses Chi-Square Test

    Database driven by interactive web applications are at risk of SQL Injection Attacks (SQLIA) these applications accept user inputs and use them to form SQL statements. During SQL injection process the attacker inputs malicious SQL query segments which will result in different database request. SQLIA can be use to bypass...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2011

    Performance Enhancement by Measuring Traffic at Edge Routers in a High Speed Networks

    There is an enormous increase of traffic on the network due to usage of real-time multimedia applications, which became an indispensable part of Internet traffic in the present day world. These applications include voice over IP, streaming audio and video, Internet gaming and real-time video conferencing. Such applications are multimedia...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // May 2011

    A Survey on Authentication Protocols for Wireless Sensor Network

    Wireless Sensor Networks (WSNs) consists of low power nodes, with limited processing, communication, and storage. The networks are made up of tiny nodes which are becoming future of many applications, but due to deployment nature the sensor nodes are prone to physical attacks against the adversaries and resource limitations raises...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Apr 2011

    A Survey of Soft Handoff Prioritization Schemes in CDMA Cellular Networks

    Cellular communications systems require handoff to provide seem less service for users moving across cells. Code Division Multiple Access [CDMA] systems support soft handoff where a Mobile Station [MS] starts communication with the target Base Station [BS] without disconnecting from the serving BS. Rejection of soft handoff request due to...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2010

    The Web Identity Prevention: Factors to Consider in the Anti-Phishing Design

    Phishing is the immorally deceitful process of attempting to acquire sensitive information such as user names, passwords and financial credentials by covered as a trustworthy entity in a communication. Phishing is normally starts with e-mail or bulk messaging, and it often directs users to enter details at a fake website...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2013

    An Efficient Framework for Enhancing Security in the Cloud Environment

    Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. Security is considered to be one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud and also due to the...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2013

    A Spic-and-Span Gateway for Secure Data Storage in Cloud Computing Environment

    Cloud computing is a light weight methodology. The cloud based applications are accessed by the end user through the use of web browser or a light weight desktop. In recent year, cloud computing is a one of the great powerful luminous star in the universal IT industry. Spotlight of this...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2013

    Enhanced Energy Management in WSN Using LW Security Algorithms

    The sensor nodes are typically resource deficient with energy being the most critical of all the resources. There are usually several security requirements to protect a sensor network. These requirements should be considered during design of a security protocol, including confidentiality, integrity, and authenticity. An effective security protocol should provide...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2013

    Key Updation for the Dynamic Attributes in Cloud Computing for Competent User Retraction

    Companies are into the cloud and provide services on it. the increasing popularity of cloud computing draws attention to its security challenges, which are particularly worsen due to resource sharing. This technology is prone to security threats because of which the users want to trust their precious data. Several schemes...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2010

    Lightweight TCP/IP Architecture Model for Embedded Systems Using SysML

    Embedded systems are usually suffering from limited resources which require a modified architecture of software to take the best usage of the resources. TCP/IP is the most important communication protocol for networked embedded systems which provide internet connectivity for hosts. Many of TCP/IP development for embedded systems lack system modeling,...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Apr 2010

    High Secure Fingerprint Authentication in Ad Hoc Network

    In this paper, the methodology proposed is a novel robust approach on secure fingerprint authentication and matching techniques to implement in ad-hoc wireless networks. This is a difficult problem in ad-hoc network, as it involves bootstrapping trust between the devices. This journal would present a solution, which provides fingerprint authentication...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // May 2011

    A Survey on Authentication Protocols for Wireless Sensor Network

    Wireless Sensor Networks (WSNs) consists of low power nodes, with limited processing, communication, and storage. The networks are made up of tiny nodes which are becoming future of many applications, but due to deployment nature the sensor nodes are prone to physical attacks against the adversaries and resource limitations raises...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    A Min-Process Checkpointing Protocol for Deterministic Mobile Ad Hoc Networks

    The mobile ad hoc network architecture consists of a set of mobile hosts that can communicate with each other without the assistance of a base station. Nodes within each other radio range communicate directly via wireless links while these which are far apart rely on other nodes to relay messages....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    Stable and Reliable Broadcast Scheduling in Multi-Hop MANET

    This paper presents a broadcasting protocol called Stable Reliable Broadcast Scheduling (SRBS) designed for multi-hop wireless ad hoc networks. Due to multi-hop limited bandwidth and the dynamic changes of the network topology, the network performance is highly hindered. The SRBS enables bandwidth-efficient broadcasting in wide area network. The protocol was...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    Security Architecture of Cloud Computing

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Sep 2011

    Path Loss Compensation Technique for Wimax Technology Based Communication System

    WiMAX is the most promising high speed wireless technology to provide necessary support with flexible Quality of Service (QoS). The authors have investigated the effect of various parameters such as signal frequency, base station antenna height, distance between base station antenna and subscriber station on path loss for WiMAX frequency...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Aug 2011

    A Security Framework for Virtualization Based Computing Environment

    Virtualization in simple words refers to the way of running more than one operating system in a single machine at the same instance of time which is not possible in the a multi-booting operating system. With an advantage so many disadvantages are there, in this paper, the authors describe about...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    The Criteria Require for Cluster Head Gateway Selection in Integrated Mobile Ad Hoc Network

    A wireless ad hoc network consists of mobile nodes that move freely and communicate with each other using wireless links. Mobile wireless Sensor Networks are widely recognized as one of the most promising technologies in both academia and industry. An Adhoc network is a dynamic multi-hop wireless network established by...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Avoidance of Cochannel Interference in Dynamic Channel Allocation in a Broadband Fixed Wireless Access Network Using Modified Genetic Algorithm

    In this paper DCA using Modified Genetic Algorithm (MGA) is applied to a Broadband Fixed Wireless Access (BFWA) network that provides data services. The performance of the modified GA is compared using a simulation with other DCAs namely the Least Interfered (LI) and Channel Segregation (CS) and simple genetic algorithm....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Guard Against Cooperative Black Hole Attack in Mobile Ad-Hoc Network

    A mobile ad-hoc network is an autonomous network that consists of nodes which communicate with each other with wireless channel. Due to its dynamic nature and mobility of nodes, mobile ad hoc networks are more vulnerable to security attack than conventional wired and wireless networks. One of the principal routing...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Intelligent Polling System Using GSM Technology

    Voting is the foundation of a democratic system of government, whether the system uses direct or representative governance. To increase the efficiency and accuracy of voting procedures, computerized voting systems were developed to help collecting and counting the votes. For a variety of reasons, voters may be unable to attend...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Effective Load Balancing Algorithm for Grid Wireless Sensor Networks

    Routing is always a challenging issue in sensor networks due to the constraints such as memory, power and processing capabilities of the CPU. In this paper, the authors explore a load balancing algorithm for N x N grid sensor network. Here they assume an All to All communication mode. This...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Comprehensive Performance Analysis and Special Issues of Virtual Private Network Strategies in the Computer Communication: A Novel Study

    An Internet-based virtual private network uses the open, distributed infrastructure of the Internet to transmit data between corporate sites. VPNs using the Internet have the potential to solve many of the business networking problems. Virtual Private Networks provide an economical yet secure way to connect sites together and to provide...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jul 2011

    Energy Efficent Routing Protocol in Wireless Sensor Network

    Wireless sensor networks consist of small battery powered sensor nodes with limited energy resources. The area of wireless sensor networks is now attractive in the research area due to its applications in many fields such as defense security, civilian applications and medical research etc. In wireless sensor networks, the important...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Apr 2011

    A Survey of Soft Handoff Prioritization Schemes in CDMA Cellular Networks

    Cellular communications systems require handoff to provide seem less service for users moving across cells. Code Division Multiple Access [CDMA] systems support soft handoff where a Mobile Station [MS] starts communication with the target Base Station [BS] without disconnecting from the serving BS. Rejection of soft handoff request due to...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Apr 2011

    Security Measures for Black Hole Attack in MANET: An Approach

    A Mobile Ad-Hoc Network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on continual basis. Due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of the malicious...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Apr 2011

    Fuzzified Dynamic Power Control Algorithm for Wireless Sensor Networks

    This paper proposes novel energy efficient algorithm FDPCA for Wireless Sensor Networks (WSN). However, energy consumption is one of the major drawbacks in most of the Wireless Sensor Networks. Parameters like End to End Delay and Received Signal Strength Indicator (RSSI) are considered for exercising the influence on transmit power....

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Apr 2011

    Node Disjoint-Virtual Circuit Approach in Ad Hoc On-Demand Multipath Distance Vector Routing to Offer Quality of Service in Ad Hoc Networks

    Multi-path routing represents a promising routing method for wireless mobile ad hoc networks. Multipath routing achieves load balancing and is more resilient to route failures. Numerous multipath routing protocols have been proposed for wireless ad hoc networks and the most important among them is Ad hoc On-demand Multipath Distance Vector...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Apr 2011

    Review and Analysis of the Issues of Multicast Routing in Ad Hoc Networks: A Novel Study

    Mobile ad hoc networks are "Infrastructure-less" networks since they do not require any fixed infrastructure such as a base station for their operation. In general, routes between nodes in an ad hoc network may include multiple hops and hence it is appropriate to call such networks as "Multi-hop wireless ad...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    An Efficient Power Mode Scheduling Algorithm for Adhoc Networks

    An ad hoc network is a set of mobile wireless nodes that cooperatively form a network among themselves without any fixed infrastructure. Ad hoc networks therefore refer to networks created for a particular purpose. They are often created on-the-fly and for one-time or temporary use. Often, ad hoc networks are...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    An Analysis of Real Time Routing Protocols for Wireless Sensor Networks

    Recent advances in Wireless Sensor Networks (WSN's) have lead to rapid development of real time applications. Many routing protocols are designed for these applications where timely delivery of the message is of utmost importance. This paper presents comparative analysis of various existing real time routing protocols in wireless sensor networks,...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    Review of Different TCP Variants in Ad-Hoc Networks

    Mobile Ad-hoc NETworks (MANETs) are collection of mobile nodes that dynamically forming a temporary network without pre-existing network infrastructure and communicate with its neighbors to perform peer to peer communication and transmission. Transmission Control Protocol (TCP) provides connection oriented, reliable and end to end mechanism. It tries to control packet...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    Performance Improvement of TCP in Manets

    Ad hoc network is the collection of mobile devices forming a temporary network without an internet need for a centralized infrastructure or access point and any node can be connected to network temporarily. To support mobility, in ad hoc network node communicates by wireless channel. In this temporary link failures...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    Secure Data Aggregation in Wireless Sensor Network: A Survey

    In the recent years, Wireless Sensor Network appears as an emerging technology which consists of thousands of small and low cost sensors. These sensors have limited power, computation, storage and communication capabilities. Communication among sensors consumes a considerable amount of energy and thus the amount of data transmission should be...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    Removal of Black Hole Attack in Ad Hoc Wireless Networks to Provide Confidentiality Security Service

    Ad hoc wireless networks are infractureless networks and consists of mobile nodes. To provide protected communication between mobile nodes security is the essential requirement in ad hoc wireless networks. Secure communications among the mobile nodes are achieved by consequential challenges. These challenges are overcome by building the multiple security solutions...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    Reliability of Higher Mapping Techniques Over Noisy Channel With OFDM for Wireless Services

    High error rate and amplitude/phase imbalances can degrade the performance of any OFDM based wireless networks. Also the proper recovery of the input at the receiver end becomes questionable. The effect of such impairments can be compensated by using high order mapping techniques. This paper analyzes the performance of M-QAM...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    Design and Implementation of Wireless Automatic Meter Reading System

    Designing and implementing commercial as well as industrial systems based on Wireless communication has always been a prominent field of interest among many researchers and developers. This paper presents an implementation methodology for a Wireless Automatic Meter Reading System (WAMRS) incorporating the widely used GSM network. In many countries GSM...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Mar 2011

    QoS & QoE Management in Wireless Communication System

    Now a day, Wireless communication systems are popular due to its wide advantages. In the customer's point of view, the authors can say the most of the customer requirements related to communication from one place to another place are fulfilled up to the most extent using these systems. The initiation...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Feb 2011

    Driver Fatigue Detection Using Sensor Network

    This paper presents a new approach towards automobile safety and security. In the field of an automotive research, a method to monitor and to detect a fatigue/drowsy or a drunken driver has been studied for many years. Previous research uses sensors such as an infrared camera for pupil detection or...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Jun 2011

    Comparison the Performance of Free-Space Optical Communication With OOK and BPSK Modulation Under Atmospheric Turbulence

    Free-Space Optical communications (FSO) propagated over a clear atmosphere suffers from irradiance fluctuation caused by small but random atmospheric temperature fluctuations. This results in decreased signal-to-noise ratio and consequently impaired performance. In this paper, the Bit Error Rate (BER) performance of Free Space Optical (FSO) communication systems employing On-Off Keying...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Optimization of Capacitated Vehicle Routing Problem Using PSO

    This paper presents solution techniques for Capacitated Vehicle Routing Problem (CVRP) using metaheuristics. Capacitated Vehicle Routing Problem is divided into set of customers called cluster, and find optimum travel distance of vehicle route. The CVRP is a combinatorial optimization problem; Particle Swarm Optimization (PSO) technique is adapted in this paper...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Analytical Results for BER Performance of MIMO-Rake Receiver in WCDMA System

    The use of Rake Receiver in Wideband Code Division Multiple Access (WCDMA) system provides a unique and valuable means of combating the adverse effects of short-term multipath fading in mobile radio propagation environments. The transmitted signal bandwidth in WCDMA system is much larger than the coherent bandwidth of the channel,...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Research Survey on MIFARE With RFID Technology

    paper that discusses the evolving technology of MIFARE and its potential for replacing the existing RFID technology. Though RFID technology has several advantages there are several technical disadvantages of RFID. As RFID makes use of radio waves they are susceptible to interference and moreover memory is less and is devoid...

    Provided By International Journal of Engineering Science and Technology

  • White Papers // Oct 2011

    Distributed Performance Evaluation Tool for Inferring Router Packet Forwarding Based on Priority

    Packet based Weighted Fair Queuing (PBWFQ) in routers is one of the mechanisms commonly available to network operators. PBWFQ can have a considerable impact on the precision of network dimensions, the performance of applications and the efficiency of network troubleshooting procedures. Regardless of its potential impacts, no information on PBWFQ...

    Provided By International Journal of Engineering Science and Technology