International Journal of Scientific & Engineering Research

Displaying 1-40 of 277 results

  • White Papers // Sep 2013

    Cloud Computing : Service Level Agreements(SLA)

    Cloud computing is a very complex system. It involves integration of many information communication technologies, like internet, distributed computing, grids, client-server, etc. main issue with any cloud is user's trust. To achieve this user-trust many solutions are put forth by scientists one of which is service-usage agreement based cloud development....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Sep 2013

    The Secure Dynamic Source Routing Protocol in MANET to Authenticate the Node

    The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. DSR allows the network to be completely self-organizing and self-configuring, without the need for any existing network infrastructure or administration. The protocol is composed...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2013

    Secured Broadband Data Access System In WiMAX

    Security mechanism is to meet the expectations from mobile users to provide seamless services in mobile WiMAX. Handover should take place in highly secured and in most improved means. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2013

    Secure Cloud Service Management and its Resource Utilization of Server Using Volunteer Computing

    Cloud computing delivers the computing resources to the user as a service over an internet. It uses wireless services with a user's data, software and computation. So spreaded over almost all it sector and become a rich area of research. Cloud computing composes of virtualization, on demand deployment. Here, user...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jun 2013

    Survey Paper of Fuzzy Data Mining Using Genetic Algorithm for Intrusion Detection

    In spite of growing information technology widely, security has remained one challenging area for computers and networks. Recently many researchers have focused on intrusion detection system based on data mining techniques as an efficient strategy. Intrusion detection is one of the important and essential area of research. This paper has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Improving Security & QoS in IP-Based MANETs

    A Mobile Ad-hoc NETwork (MANET) is a temporary network formed by the collection of mobile nodes. The network formed doesn't require any physical infrastructure. There is no central authority to administer the services and configurations of the network. Securing MANETs is still an active area of research. In this paper,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Progressive Image Hotspot Navigation for Progressive Image Hotspot Navigation for successful Security Evaluation

    Storing the images in a secure database through file stream data type is one of the options used to secure the images instead of storing the images in the server. Users will be provided an option of selecting the images to create the authentication page which is not included in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Cryptographic Provenance Verification for Secure Hosts

    To improve the trustworthiness of a host and system data cryptographic verification technique is used. From these approach users keystroke to identify the legitimate user's to get the service from the server by using integrity verification and malicious traffic detection. But the main issue of this approach is keystroke hacking...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Email Spam Zombies Scrutinizer In Email Sending Network Infrastructures

    Email spammers are constantly pioneering the techniques to bypass anti-spam filters forcing many organizations to invest in spam email prevention mechanisms and solutions. Traditional email spam filters aims at analyzing the email content to characterize the best features that are commonly included in email spams. However, this is observed that...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Wormhole Attack Prevention By Next Hop Analysis

    A Mobile Ad-hoc NETwork (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. It uses open medium, dynamic topology and distributed co-operation. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    File and Database Integrated Databse Transformations: An Middleware

    Database transformation is the process of transferring a table or whole schema of a database, from one database to another. The database transformations have either been performed using 'Command line interface' or import tools. This traditional process is complex and becomes tedious when same set of transformation has to be...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Controlling Database Access by Providing Access Permissions on Database Objects

    In this paper, the authors focus on securing a table in the database, to the row level, implying that not all the rows in a database can be accessed by the end user. A user can access and perform operations on only those rows which he has been assigned right...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Context-Sensitive Modeling for Intrusions Detection in Multitier Web Applications

    This strategy is mainly focus on to detect intrusion in multitier web applications. Multitier web application include two ends that is front end as well as back end of the applications. Modern multi-tier application systems are generally based on high performance database systems in order to process and store business...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Survey on RFID Authentication with Different Protocols

    Security is an important concept in the process of communicating data across network. Although there are many authentication protocols implemented for the security of message from the sender to the receiver. It is also necessary in various communication devices such as RFID where the data from the tag can be...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Scheduling in Instance-Intensive Cost-Constrained Workflows in a Cloud

    Cloud computing has been growing tremendously, as it has been accepted recently. Cloud computing has many unique strengths which can be utilized to facilitate workflow execution. This paper investigates the issue of dynamic scheduling in cloud computing with a special attention to the case of instance-intensive cost-constrained workflows. This paper...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    A Review Model on Query Optimization Using Open Source Database

    Query optimization is used to optimize the efficient result with less time and minimum cost. The query formatted according to particular search engine and then the translated query is passed to the search engines. HTML screen scrapping is used to parse the data from each individual search engine. Then these...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2013

    Enhancing the Security of Biometrics in ATM

    Biometrics based authentication provides various advantages over other authentication methods, it has replaced the password based authentication and token based authentication. Biometrics plays a major role in Automated Teller Machine (ATM) system, e-commerce, online banking and passports. The growth in electronic transactions has been increased tremendously; there is a greater...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Biometric Security Systems and Contemporary Affirmation of State of Art

    Biometrics is playing vital role in applications that are centric to tasks such as identification, verification and classification. One distinctive illustration is a biometric verification structure that concludes the user's authorization by validating the biometric traits submitted by the user. The human traits preferred for biometric systems are universally unique...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Security from Threats on Vehicular Adhoc Network

    A Vehicular Ad-hoc NETwork (VANET) is a new type of ad hoc network that is becoming even more popular than the original ad hoc concept. A Vehicular Ad-hoc NETwork (VANET) is a technology that uses moving cars as nodes in a network to create a mobile network. VANET turns every...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    FP Tree Algorithm using Hybrid Secure Sum Protocol in Distributed Database

    At the enhancement of new technology and growth of the network the new data is coming and being added to the database at every fraction of seconds. For accessing and storing data a specialized tool is required. An FP Tree mining algorithm increases the environmental growth for accessing the data...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Mobile Cloud Computing: Security Challenges for Threats Reduction

    Now-a-days, with the remarkable advances in information technology, mobile cloud computing with the security challenges and with factors privacy and trust is faced. MCC, in cloud computing technology for mobile devices is important. In MCC technology considering the hardware limitations of the device such as mobile phones, tablets and smart...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Effective Discovery Of E-mail Spam Using Spot Detection System

    Compromised machines on the Internet are generally referred to as bots, and the set of bots controlled by a single entity is called a botnet. Botnets have multiple nefarious uses: mounting Distributed denial of service attacks, stealing user passwords and identities, generating click fraud, and sending spam email. Compromised machines...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    A Survey on Mobile Databases and Query Processing in Mobile Databases

    Mobile computing is increasingly becoming more and more popular as people need information even on the move in this rapid changing information world. Mobile computing is an environment where user is mobile and can change its place while communicating. A mobile database is a database that can be connected to...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    A Survey on Data Mining: Tools, Techniques, Applications, Trends and Issues

    Data mining is a process which finds useful patterns from large amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It uses machine learning, statistical and visualization techniques to discovery and present knowledge in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Fuzzy-GA Optimized Multi-Cloud Multi-Task Scheduler for Cloud Storage and Service Applications

    Computing clusters have been one of the most popular platforms for solving Many Task Computing (MTC) problems, especially in the case of loosely coupled tasks. However, building and managing physical clusters exhibits several drawbacks: major investments in hardware, specialized installations, and qualified personal; long periods of cluster under-utilization; cluster overloading...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    NIDS Using Attack Patterns

    Now-a-days intrusion detection system becomes important topic because of its capabilities. Intrusion detection becomes a vital part of a systems as it detects various network attacks. Various intrusion detection systems are developed up till now, depending upon their capabilities. This paper proposes the intrusion detection system based on pattern matching...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2013

    Cloud Storage Gateway for Industry Data Base

    In the present time cloud storage gateway are important to the Industry. These appliances are growing in popularity and with clear indicators that the cloud storage space is growing. Object base storage has lack of standardized cloud storage Application Programming Interfaces (APIs) means customers will have to deploy cloud storage...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    The Secure Cluster and Energy Efficient in Geocast for Manets Using Selection Gateway Method

    The secure and energy efficient geocast method using for a mobile ad hoc network, it's based on a secure clustered agreement with data declaration release from the basis node of the system and all nodes located in one or more geocast regions on the network. To improving the energy efficient...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    Secure Routing Using Trust Based Mechaniam in Wireless Sensor Networks(WSNs)

    Wireless Sensor Networks (WSN) is a most challenging and emerging technology for the research. Today wireless sensor networks are broadly used in environmental control, surveillance tasks, maintaining tracking, controlling, etc. On the top of all this the wireless sensor networks need very secure communication. Ensuring confidence between every pair of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2013

    Classification of Attacks in Network Intrusion Detection System

    The authors have designed a network intrusion detection system based on the artificial neural networks using Multi Layer Perception (MLP) and Modified signature Apriory algorithm; and the testing results of the prototype system proved the validity of the method and the advantages over other methods suggested. In the present study...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    To Overcome DoS and DDoS Flooding Attacks in IP Multimedia Subsystem (NGN) Using the Genetic Intrusion Detection Systems (IDS)

    IP Multimedia Subsystem designed by the third Generation Partnership Project to provide the access networks services and telecommunication services, plans to merge services like multimedia, data and voice conversation under one umbrella. In this research, network based anomaly detection system is proposed by using Genetic Algorithm rules to avoid such...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    A CRM Based Cryptography Service for Ensuring Security in Cloud Computing

    Cloud Computing is more than a technology. It is more than a platform. It is more than just a hosting provider. It is more than just an application hosted as a service. It is more than providing storage services on the Internet. It is a combination of all the above....

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Impact of Database Security in Cloud Computing

    In this paper, the authors discuss about the database services available in cloud computing environment, analyses the security risks combination and propose the possible counter measures to minimize the risks. And also analyzes the cloud database service providers namely; Amazon and Xeround, RackSpace2. The reason behind choosing these are providers...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    A Highly Secure Integrated Biometrics Authentication Using Finger-Palmprint Fusion

    Biometric authentication is the verification and identification of a person uniquely based on physical characteristics such as finger print, palm print, retina, iris, face etcetera or behavioral characteristics such as signature, gait, typing patterns, voice etcetera. Existing single modal biometric system has more error rate and provides less security than...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Types of Malware and its Analysis

    Malware - the increasingly common vehicle by which criminal organizations facilitate online crime - has become an artifact whose use intersects multiple major security threats (e.g., botnets) faced by information security practitioners. The paper explores the still-growing threat of website malware, specifically how hackers compromise websites and how users become...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Cloud Computing: The Base of Future Operating Systems

    Operating system, the soul of an electronic device, has been turned into a subject of great competition among the companies and of fascination among the techies. New operating systems are being developed by different companies while olds are getting updates. Now come to the word 'Cloud computing'. Though it has...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2013

    Cooperative Provable Data Retention for Integrity Authentication in Multi-Cloud Storage

    Provable Data Retention (PDR) is a technique which certain the integrity of data in storage outsourcing. In this paper the authors propose an efficient PDR protocol that prevent attacker in gaining information from multiple cloud storage node. Their technique is for distributed cloud storage and support the scalability of services...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2012

    VoIP Cell Phones : Security Concerns and Countermeasures

    In this paper, the authors deal with modern cellular phones that operate on Voice over Internet Protocol, their current development, several Information security risks associated with them and various countermeasures that can be undertaken to prevent data theft/misuse. VoIP is vulnerable to well known traditional modes of attack such as...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2012

    Enhancing Data Security in Cloud Computing

    Cloud computing is a new mechanism to deliver products from producer to consumer in a very different and efficient style of computing. It has revolutionized not only the IT industry but has also revolutionized the hardware and software industry. It is growing leaps and bounds and has only bright sky...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Nov 2012

    Wireless Broadband Network Technology Infrastructure and Related Intellectual Property Application & Security

    Since the beginning of this millennium, there has been an unprecedented growth in broadband wireless networks. This paper can be attributed to high demand for wireless multimedia services such as data, voice, video, and the development of new wireless standards. The growth of wireless broadband networks is expected to gradually...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Dec 2010

    A Fault-Tolerant Scheme for Routing Path Reestablishment for Reliable Communication in Heterogeneous Networks

    In heterogeneous environments, devices accessible in different networks may help to provide new opportunities for utilizing new services when they are connected efficiently. In mobile ad hoc networks, it is very difficult in maintaining the links among the devices, because of the frequent change in the density of mobile devices,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Nov 2010

    Fiber Optics Based Parallel Computer Architecture

    Computer architecture is the conceptual design and fundamental operational structure of a computer system. It's a blueprint and functional description of requirements and design implementations for the various parts of a computer, focusing largely on the way by which the Central Processing Unit (CPU) performs internally and accesses addresses in...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Nov 2010

    A Survey of Frequency and Wavelet Domain Digital Watermarking Techniques

    Due to improvement in imaging technology and the ease with which digital content can be reproduced and manipulated there is a strong need for a digital copyright mechanism to be put in place. There is a need for authentication of the content as well as the owner. It has become...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2010

    Online Banking: Information Security Vs. Hackers Research Paper

    In this paper, the authors will discuss four scenarios regarding cyber crimes specifically directed at financial institutions and give specific examples. Also, I will discuss the malicious Zeus and URLzone bank malware Trojans that is currently causing security issues and threats to some financial institutions. Expected results from study and...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2010

    Server Consolidation: An Approach to Make Data Centers Energy Efficient and Green

    Data centers are the building blocks of IT business organizations providing the capabilities of centralized repository for storage, management, networking and dissemination of data. With the rapid increase in the capacity and size of data centers, there is a continuous increase in the demand for energy consumption. These data centers...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Oct 2010

    FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E

    Data Security is an important parameter for the industries. It can be achieved by Encryption algorithms which are used to prevent unauthorized access of data. Cryptography is the science of keeping data transfer secure, so that eavesdroppers (or attackers) cannot decipher the transmitted message. In this paper the DES algorithm...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    An Efficient Shortest-Path Aided Back-Pressure Routing Over Multihop Wireless Network

    This project proposes a new optimal routing/scheduling back-pressure algorithm that not only guarantees network stability (throughput optimality), but also adaptively selects a set of optimal routes based on shortest-path information in order to minimize average path lengths between each source and destination pair. The authors' result indicates that under the...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Middle Graded Offices of an Organization and Internet Use

    This research project is a longitudinal field study designed to examine the antecedents and consequences of Office Internet use in middle graded employees of a government organization related to the research and development field of work. Does using the Internet affect Professional's development? Do employees become efficient in their work?...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Feb 2012

    Application of Wavelet Packet Analysis for Speech Synthesis

    Wavelets are mathematical functions that cut up data into different frequency components, and then study each component with a resolution matched to its scale. They have advantages over traditional Fourier methods in analyzing physical situations where the signal contains Discontinuities. Wavelet packet analysis is analysis the different entropy of voice...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Reconfigurable Embedded Multiprocessor Architecture With ARISE Interface Using FPGA

    Modern Embedded multiprocessor design presents challenges and opportunities that stem from task coarse granularity and the large number of inputs and outputs for each task. They are complex systems that often require years to design and verify. A significant factor is that engineers must allocate a disproportionate share of their...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    A Framework for Knowledge Discovery, Knowledge Use and Knowledge Management

    A framework for knowledge discovery, knowledge use, and knowledge management is presented in this paper to provide knowledge-based access of the domain databases using multi-agent systems approach. This framework encompasses five different agents: namely, knowledge management agent, data filter agent, rule induction agent, dynamic analysis agent, and interface agent. This...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Mechanisms of Tunneling IPv6 in IPv4 networks

    In IpV4 major requirement is that all the IP networks should have unique network number, even if they are or if they are not connected with the internet, which results in the consumption of more addresses, due to this consumption IP addresses in IPV4, are becoming exhausted. Secondly the structure...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    A Critical Review on the Development of Urban Traffic Models & Control Systems

    Modeling and development of control systems to deal with the congestion at intersection in urban traffic is a critical research issue. Several approaches have been used to develop the modeling and controlling phenomenon in the said problem. These approaches include, Petri net, Fuzzy Logic, Neural Network, Genetic Algorithms, Activity Theory,...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Secured Multi Path Routing With Trust Establishment Using Mobile Ad Hoc Networks

    The authors propose a novel method of message security using trust-based multi-path routing. Simulation results, coupled with theoretical justification, affirm that the proposed solution is much more secured than the traditional multi-path routing algorithms. The authors propose a method to securely route messages in an ad-hoc network using multi-path routing...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Digitally Greenhouse Monitoring and Controlling of System Based on Embedded System

    Monitoring and control of greenhouse environment play an important role in greenhouse production and management. To monitor the greenhouse environment parameters effectively, it is necessary to design a measurement and control system. The objective of this project is to design a simple, easy to install, microcontroller-based circuit to monitor and...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Modeling a Homogenate GIS Architecture Based on Service Oriented Architecture for the Tourism Mapping Needs

    Location information is a set of data describing an individual geographical location. This information can be used in many ways to provide information and entertainment services to the user who has the require devices and resources to operate such services. However, different challenges are reported in terms o availability and...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Applied Software Project Management Software Project Planning

    Most critical activities in the modern software development process is without a realistic and objective software project plan, the software development process cannot be managed in an effective way. The purpose of project planning is to identify the scope of the project, estimate the work involved, and create a project...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    FPGA Based Embedded Multiprocessor Architecture

    Embedded multiprocessor design presents challenges and opportunities that stem from task coarse granularity and the large number of inputs and outputs for each task. The authors have therefore designed a new architecture called Embedded Concurrent Computing (ECC), which is implementing on FPGA chip using VHDL. The design methodology is expected...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Two Levels TTL for Unstructured P2P Network Using Adaptive Probabilistic Search

    P2P networks are playing an important role in current scenario of unstructured networks. P2P network supports various applications and taking the advantage over the centralize search system .Centralize search systems suffer from the problems of single point of failure, low availability, denial of service attacks. Searching of the required data...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Eight User, 4Gb/s, Spectral Phase-Encoded OCDMA System in Time Domain for Metropolitan Area Network

    In 1959 J. E. Volder presents a new algorithm for the real time solution of the equations raised in navigation system. This algorithm was the best replacement of analog navigation system by the digital. CORDIC algorithm used for the fast calculation of elementary functions like multiplication, division, trigonometric functions, logarithmic...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Method of Speech Signal Compression in Speaker Identification Systems

    In this paper, the authors present a technique of efficacy improvement of speech signal compression algorithm without individual features speech production loss. The compression in this case means to delete, from the digital signal, those quantization steps that can be predicted. The authors propose to decrease the number of those...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    New Approach for Detecting Intrusions

    This paper describes how multi-agent systems can help to solve a complex problem such as security and more precisely intrusion detection. Intrusion Detection System (I.D.S) is a component of the security infrastructure designed to detect violations of security policy. Most of the intrusions can be localized either by considering of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Nov 2011

    Geographic Information System (GIS) - For Business Analytics

    Modern Commerce, advanced technologies and infrastructure stimulates business expansions. India being an emerging market finds its continuous expansion exhibiting the growth registered every year. This phenomenon of expansion in retail business is in the verge of sustenance as observed by the rapidly increasing number of Malls all over metros of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    Performance Evaluation of LEACH Protocol in Wireless Network

    Wireless micro sensor networks lend themselves to trade-offs in energy and quality. By ensuring that the system operates at a minimum energy for each quality point, the system can achieve both flexibility and energy efficiency, allowing the end-user to maximize system lifetime. Simulation results show that the proposed adaptive clustering...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2012

    Efficient AODV Routing Protocol for MANET With Enhanced Packet Delivery Ratio and Minimized End to End Delay

    Communication takes place by routing protocols in effective and efficient manner in wireless network. Efficient protocols are used to forward data packets without much packet loss. Mobile Ad hoc NETwork (MANET) is a collection of mobile devices, a self configured, multi-hop network. Simulating Tool NS-2 is an outstanding network simulating...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Aug 2012

    Secure Trust Based Dynamic Source Routing in MANETs

    Secure routing is an important issue in MANETs. A particularly devastating attack in wireless networks is the black hole attack. The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustworthiness of other nodes...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    Segmentation Techniques for Iris Recognition System

    A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Iris recognition systems capture an image of an individual's eye, the iris in the image is...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    Positive Impact of Mobility Speed on Performance of AODV at Increased Network Load

    This paper studies impact of changing mobility speed on the performance of a reactive routing protocol AODV with reference to varying network load. For experimental purposes, initially the authors observed the performance of AODV with increasing Network Load from 4 packets to 24 packets at the maximum mobility speed of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    An Innovative Quality of Service (QOS) Based Service Selection for Service Orchrestration in SOA

    Service Oriented Architecture (SOA) has become a new software development paradigm because it provides a flexible framework that can help reduce development cost and time. SOA promises loosely coupled interoperable and composable services. Service selection in business processes is the usage of techniques in selecting and providing Quality of Services...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Jan 2012

    An Overview on Decision Techniques for Vertical Handoffs Across Wireless Heterogeneous Networks

    Wireless communication of the future will comprise of several heterogeneous networks whose access technologies will vary to a large extent on the network capacity, data rates, bandwidth, power consumption, Received Signal Strength and coverage areas. With their complementary characteristics, integration of these networks to offer overlapping coverage to mobile users...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    Slant Transformation as a Tool for Pre-Processing in Image Processing

    The SLantlet Transform (SLT) is a recently developed multiresolution technique especially well-suited for piecewise linear data. The Slantlet transform is an orthogonal Discrete Wavelet Transform (DWT) with 2 zero moments and with improved time localization. It also retains the basic characteristics of the usual filterbank such as octave band characteristic...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    Separation of Concerns in VoiceXML Applications

    Many commercial applications provide customer services over the web like flight tracking, emergency notification, order inquiry etc. VoiceXML is an enabling technology for creating streamlined speech-based interface for such web-based information services. Whereas in computing, Aspect-Oriented Programming (AOP) is a programming paradigm, which aims to increase modularity. AOP includes programming...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    Processing of Images Based on Segmentation Models for Extracting Textured Component

    The method for segmentation of color regions in images with textures in adjacent regions being different can be arranged in two steps namely color quantization and segmentation spatially. First, colors in the image are quantized to few representative classes that can be used to differentiate regions in the image. The...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Apr 2011

    An Adaptive and Efficient XML Parser Tool for Domain Specific Languages

    XML (eXtensible Markup Language) is a standard and universal language for representing information. XML has become integral to many critical enterprise technologies with its ability to enable data interoperability between applications on different platforms. Every application that processes information from XML documents needs an XML Parser which reads an XML...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    Establishing Bridges Between UML, HAD and GRAFCET Metamodels for the Modelling of Dynamic Systems

    This paper shows the scope and limits of UML as a tool for modelling Automatic Control Systems. An alternative metamodel, Hybrid Activity Diagram (HAD), is proposed and applied to a concrete example, in order to illustrate its efficiency in comparison to the limits of UML diagrams. The paper also presents...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    Parameter Ranking and Reduction in Communication Systems

    Parameter reduction from experimental data is an important issue arising in many frequently encountered problems with different types of applications in communications engineering. However, the computational effort grows drastically with the number of parameters in such types of applications. This paper proposes a technique that reduces the performance parameters of...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    Trust Enhanced Authorization for Distributed Systems

    The trust - management approach to distributed system security is developed as an answer to the inadequacy of traditional authorization mechanism. The subjective concept of trust not only enables users to better understand the paradigm of pervasive computing, but also opens new direction of research for solving existing problems such...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    Filtering Noise on Two Dimensional Image Using Fuzzy Logic Technique

    This paper presents one simple and novel technique for removal of impulse noise from corrupted image data. The algorithm involves impulse detection followed by spatial filtering of the corrupted pixels. In this method the presence of impulse noise is detected by a simpler method called a Fuzzy Logic based Technique...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    A Study to Enhance Human-Resource Performance Efficiency for Minimizing Cost in Software Development Projects

    Human resources in software development projects require a high level of individual intensity devoted to project tasks, which then is integrated collaboratively to complete the project. Human resources technical skills and implementation experience are key factors for project success and therefore must be allocated and managed judiciously. Despite of the...

    Provided By International Journal of Scientific & Engineering Research

  • White Papers // Mar 2011

    Design of HDLC Controller Using VHDL

    In this paper, the authors explore a High-level Data link control published by International Standards Organization (ISO). HDLC is one of the most enduring and fundamental standards in Communications. HDLC is in itself a group of several protocols or rules for transmitting data between network points. The HDLC protocol also...

    Provided By International Journal of Scientific & Engineering Research