Iosrjournals

Displaying 1-40 of 999 results

  • White Papers // Nov 2014

    Intent Search and Centralized Sybil Defence Mechanism for Social Network

    Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occurs when the one-to-one relationship between a node and its identity is violated. This is occurred by an attacker creates multiple pseudonymous identities and pretends to be multiple, distinct nodes in the system. Intent search...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    A Clustered Based Novel Approach of Graph Coloring

    An efficient graph coloring algorithm is proposed in this research paper that uses less number of colors for a graph coloring problem. The proposed algorithm is applicable for all types of graph. The algorithm works by dividing the vertices into two clusters i.e. non-visited type of clusters including the nodes...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    5 Pen Technology

    Computer affects the peoples' life in a much bigger way then most of them might have thought. It has become a compulsory requirement in most professions to be able to use computer software. The first computer invented was the ENIAC in 1943 which was the same size of a large...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Comparative Study and Performance Analysis of Routing Protocols for MANET

    Wireless communication between mobile users is becoming more popular than ever before. This is due to recent technological advances in laptop computers and wireless data communication devices, such as wireless modems and wireless LANs. This has lead to lower prices and higher data rates, which are the two main reasons...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Scalable parallel clustering using modified Firefly algorithm

    Clustering is the process of assigning data objects into a set of disjoint groups called clusters so that objects in each cluster are more similar to each other than objects from different clusters. The authors try to exploit computational power from the multi-core processors. They need a new design on...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Privacy Security of Multiuser on Multilevel System using XOR

    Privacy security of multiuser on multilevel system is considered in this paper. On communication there is a chance for the eavesdropper's to secretly listen to the conversation. In order to confuse the eavesdropper's, the transmitter sends information signal to both the receiver and eavesdropper. But the original message is send...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Evaluation of the Bit Error Rate and Q-Factor in Optical Networks

    Development in backbone networks goes the way of fully optical network elements based on dense wavelength multiplexing of DWDM technology with a terabit capacity on thousands of miles distance. The paper defines the relation between the error parameters in networks that are built on optical transmission paths in relation to...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Performance Enhancement of SPD Technique in SAC-OCDMA Systems

    Multiple access techniques are needed to meet the demand for high-speed and large capacity communications in optical networks. This paper presents single photodiode as an effective technique for eradicating the effects of PIIN and MAI by cancelling interference effects in the optical domain in Spectral Amplitude Coding Optical Code-Division Multiple-Access...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Wireless Power Meter Monitoring With Power Theft Detection and Intimation System Using GSM and Zigbee Networks

    With the electric industry undergoing change, increased attention is being focused on power supply reliability and power quality. Power providers and users alike are concerned about reliable power, whether the focus is on interruptions and disturbances or extended outages. Monitoring can provide information about power flow and demand and help...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Future of Mobile Communication 5G: Perspectives, Challenges and Services

    The evolution towards 5G mobile communication networks will be characterized by increasing number of wireless devices, service complexity and the requirement to access mobile services ubiquitously. This paper presents an overview of future mobile communication generation (5G) with its perspectives, challenges and services. Moreover the authors propose novel network architecture...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Wireless Robotic ARM

    Robots are now becoming a part of the peoples' daily life and performing everyday tasks much more efficiently and smartly. Robotics as a branch of engineering deals with design, construction, operation, and application of robots. Their mobility is as efficient as the control signal. Humans can perform highly precise tasks...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Design and Implementation of Printed Micro Strip Fractal Antennas for Wireless Applications

    The need for miniaturized antenna is ever growing in view of the advancements in wireless communication technology. The conventional micro strip antennas take any shape like square, rectangular, triangle and so on. They provide normally single resonance frequency with high quality factor because of narrow bandwidth. However, the fractal antennas...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Implementing 3D Graphical Password Schemes

    Beginning around 1999, numerous graphical password schemes have been proposed, motivated by the promise of improved password memorability and thus usability, while at the same time improving strength against guessing attacks. Like text passwords, graphical passwords are knowledge-based authentication mechanisms where users enter a shared secret as evidence of their...

    Provided By Iosrjournals

  • White Papers // Nov 2014

    Hiding of Confidential Data and its Retrieval using Advanced Algorithms and QR Authentication System

    In this era of digital world, with the evolution of technology, there is an essential need for optimization of online digital data and information. Now-a-days, security and authenticity of digital data has become a big challenge. This paper proposes an innovative method to authenticate the digital documents. A new method...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Defect Forbearing Flight Data Tracker Blueprint

    In the flight tracer project, the feasibility of transmitting data to ground station in real time is investigated. Instead of waiting for a prolonged time for locating the black box, the valuable information can be recovered instantly via stations. With any airplane crash, there are many unanswered questions as to...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Casattenta: WSN Based Smart Technology

    Casattenta (Aware home, in Italian) is the demonstrator of a research paper on \"Ambient intelligence\", \"Sensor fusion\" and \"Wireless sensor networks\". The result is a system composed of fixed and wearable sensor nodes, providing elderly people living alone in their house (but also persons in other situations and environments) with...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Maximizing the Performance and Reliability of Wireless Network by Preventing Jamming Attacks

    Wireless networks are computer networks that are not connected by cables of any kind. It enables the wireless connectivity to the Internet via radio waves. So it is more sensitive to the denial-of-service attacks. This paper proposes strong hiding commitment schemes, cryptographic puzzles hiding schemes, and wormholes for sending the...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Artificial Intelligence in Power Systems

    A continuous and reliable supply of electricity is necessary for the functioning of today's modern and advanced society. Since the early to mid 1980s, most of the effort in power systems analysis has turned away from the methodology of formal mathematical modeling which came from the areas of operations research,...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    A Socket-Free Charging Technique By Utilizing The Wi-Fi Signals

    In this paper, the authors focused on equipping wireless devices (including sensors) with high-efficiency circuitry to harvest and convert ambient Radio Frequency (RF) power to direct current (dc). The authors' objective is to obtain energy effectively from electromagnetic radiations, radio waves. A Wi-Fi spot is only used to get connected...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Simulation of ONVIF Network Devices Using JAVA

    In today's world, cross platform integration of application plays important role to achieve economic viability and usability of the product. This paper describes technical details of the successfully implemented system whose roots are based on ONVIF platform. System enumerates simulation of various ONVIF capable video surveillance devices and delineates the...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    LEACH Improved for Energy-Efficient Routing in Wireless Sensor Networks

    A new idea is proposed in this paper for improvement in the Low Energy Adaptive Clustering Hierarchy (LEACH) protocol. The cluster heads are selected based on the residual energy at each node at the end of each round. The expected number of cluster heads is kept stable considering the average...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    An Intelligent Approach to Information Retrieval System Using Enhanced DIG and FP-Tree Techniques

    Information retrieval is the process of retrieving all the relevant documents that satisfies the user query from large corpora. It is aimed to provide the relevant information and documents that matches the user query. Outcome of the several research results confirms that difficulties in information retrieval are matching the query...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Performance Comparison of SVM and ANN in Predicting Compressive Strength of Concrete

    Concrete compressive strength prediction is very important in structure and building design, particularly in specifying the quality and measuring performance of concrete as well as determination of its mix proportion. The conventional method of determining the strength of concrete is complicated and time consuming hence Artificial Neural Network (ANN) is...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    An Efficient Method for Noisy Annotation Data Modeling

    Probabilistic topic models are used for analyzing and extracting content-related annotations from noisy annotated discrete data like WebPages on WWW and these WebPages are stored using social bookmarking services with the help of social bookmarking services, reason behind this process most of time users can attach annotations freely, some annotations...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Comparative Study of PEGASIS Protocols in Wireless Sensor Network

    The area of Wireless Sensor Networks (WSNs) is one of the fast growing and emerging field in the scientific and engineering world. It is an ad-hoc network that consists of small nodes with sensing, computing and communicating wireless abilities. These sensor nodes are densely deployed in the sensor field environments....

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Graphical Password Strength in Cloud Computing

    In a network, the authors have various issues to work with their services & data (maintenances) & today cloud computing provides convenient on-demand network access to a shared pool of configurable enumerate resources. The resources can be rapidly expand with great efficiency and minimal management atop. Cloud is an afraid...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Semantic Web Data Mining & Analysis

    Semantic Web mining combines two fast developing research areas: semantic web & web mining. In this relation, the research intension is to improve on the one hand, Web mining methods with new needs of semantic strategies and on another hand new strategic rule to make it fast and accurate. With...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    A Study of Geographic Adaptive Fidelity Routing Protocol in Wireless Sensor Network

    The energy consumption is a great challenge in the field on Wireless Sensor Network (WSN). It affects the performance of the whole network. There are two basic functions of nodes in the WSN. First is to collect the information from other sensor nodes and second is to pass the information...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Monitoring Selfish Nodes in MANET during Replica Allocation

    Mobile Ad hoc NETwork (MANET) is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this causes frequent changes in the network topology. Data in one network cannot be accessed...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    A Trust Based Replica Detection System for Node Replication in Mobile Sensor Networks

    Now-a-days, Mobile Wireless Sensor Networks (MWSN) has become most popular and is used to solve challenging problems as industrial sensing and environmental monitoring. MWSN are always ready to be attack by replicas behavior of nodes which would negatively affect the quality of service. Existing schemes in mobile networks incurs efficiency...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Power Control Mechanism in OFDM Based Cognitive Radio System

    Power is key parameter in communication system. In cognitive radio power of transmitter of primary user and secondary user should be at appropriate level for faithful reception, at the same time there should be no interference between and among the adjacent users. In this paper power control mechanism is proposed...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Design and Implementation of Massive MYSQL Data Intelligent Export System to Excel by Using Apache - POI Libraries

    To export nearly 10,000 attribute from database to excel of 10-20 column information of students and papers of database format into the target Excel sheet, the authors developed the intelligent export system which distinguished the simple export system. The system uses Netbeans/Eclipse as the development tool, object-oriented language java as...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework

    In the recent years, cloud computing has gained a lot of attention and big IT giants are providing cloud services to the clients. As a part of this service user data are stored in remote server machines which are managed by the cloud service provider. This necessitates the encryption of...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Examining Performance of Bluetooth Network In The Presence of Wi-Fi System

    More recently, there has been a growing interest in cognitive techniques, which allow devices and even whole networks to monitor the environment in order to dynamically select and use the channel that affects the least interference. This paper aims at simulation of Bluetooth performance with IEEE 802.11b interference and determination...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Optimization of Horizontal Aggregation in SQL by using C4.5 Algorithm and K-Means Clustering

    Datasets in the horizontal aggregated layout are preferred by most of data mining algorithms, machine learning algorithm. Major efforts are required to compute data in the horizontal aggregated format. There are many inbuilt aggregation functions in SQL, namely, minimum, maximum, average, sum and count. These aggregation functions are used with...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    A Novel Approach for intrusion Detection in Heterogeneous Wireless Sensor Networks using multipath Routing

    The key concept of the author redundancy management is to exploit the tradeoff between energy consumption vs. to the gain of reliability, timeliness, and also security for maximizing the system useful lifetime in this paper, the author proposing to explore more extensive malicious attacks in addition to packet dropping and...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Reduced Overhead Based Approach for Secure Communication in Mobile Ad Hoc Network

    Mobile Ad hoc NETwork (MANET) is an infrastructure-less mobile networks where nodes can freely move and join. MANET has attracted much attention in recent years owing to the increased focus on wireless communication. It is a highly flexible network, vulnerable to various types of security attacks by malicious nodes. Ensuring...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Implementing Security Algorithm to Worm Hole Attack Using AOMDV Protocol & Comparison Using NS2 Simulator

    In present era, where every person has become addicted to wireless networks, MANET'S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extended the range of mobile nodes beyond their level. Now when the authors talk about wireless communication, routing is...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Dynamic Query Processing and Optimization in Relational Complex Databases with Keyword Search

    Dynamic queries are a novel approach to information seeking that may enable users to cope with information overload. They allow users to see an overview of the database, rapidly explore and conveniently filter out unwanted information. Users fly through information spaces by incrementally adjusting a query while continuously viewing the...

    Provided By Iosrjournals

  • White Papers // Oct 2014

    Topology Based Data Replication Strategies in Grid

    Grid computing is an essential part of scientific experiments which involves large amount of computations. An example is the European data grid in CERN. The data involved in these experiments are large and often critical to the computations. Over the course of time many data replication strategy has been used...

    Provided By Iosrjournals

  • White Papers // Aug 2012

    An Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks - Edrleach

    The Cluster-head Gateway Switch Routing protocol (CGSR) uses a hierarchical network topology. CGSR organizes nodes into clusters, with coordination among the members of each cluster entrusted to a special node named cluster-head. The cluster head selection is done with the help of any of the algorithm for cluster head selection....

    Provided By Iosrjournals

  • White Papers // Aug 2012

    Efficient Data Delivery For Secured Communication in Vanet

    As Vehicular networks become popular, it will provide the communication between Vehicle To Vehicle (V2V) and between Vehicles To Road side unit (V2R). Security is the main issue in VANET. As there are many aspects to improve security in VANET, but still security remains the delicate research. In this paper...

    Provided By Iosrjournals

  • White Papers // Aug 2012

    Augmented Reality Tracking Techniques: A Systematic Literature Review Protocol

    Augmented Reality (AR) is a technology through which the view of real world environment is augmented by computer generated elements/objects. Tracking and registration are the key challenges in AR system. This paper aims to perform a Systematic Literature Review (SLR) for the identification of challenges during tracking an object in...

    Provided By Iosrjournals

  • White Papers // Feb 2012

    Will Cloud Computing Change Standards in ITService Management?

    One of the latest hypes in IT is the well-known Cloud Computing paradigm. This paradigm that showed up in recent years is a paradigm for the dynamic usage of computational power, memory and other computational resources. With respect to hypes, the author strongly believes that the Cloud Computing paradigm has...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Social Cloud Computing Using Social Network

    A level of trust can be developed by online relationships in social network which are based on real world relationships. To form a dynamic social cloud and to enable users to share heterogeneous resources within the context of a social network the authors have proposed leveraging of the social relationships....

    Provided By Iosrjournals

  • White Papers // Jun 2014

    A Study on Relational Semantic Video Content Extraction Using Bayesian Network Classifier

    Multimedia data mining is an emergent field, which consists of image mining, video data mining etc. The content based extraction in videos is an important application due to the rapid growth in the video based application. Semantic content is the high level concepts that is the objects and events, for...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    An Overview of Localization for Wireless Sensor Networks

    Localization is an important issue for location-dependent applications of wireless sensor networks. In Sensor networks, data collected by sensor nodes need to be tagged with time and location information. Localization techniques are used to determine the location information of a sensor node. It enables efficient routing, provides power saving, assists...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Wireless Controlling Of Remote Electrical Device Using Android Smartphone

    Controlling the home appliances and electronics gadgets wirelessly through Smartphone technology can be more easy. That is, through this paper, the authors target to control a Light Emitting Device (LED) from any place in the world and the unique concept within their application is, utilizing the data channels of GSM...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Effects of Social Networking by Influencers [Beware and Stay Safe]

    A short time agone, social spam and online abuse were much non-existent. As email spam filters became simpler, catching over ninety fifth of those messages, spammers have moved to a replacement target - the social net. Over ninetieth of social network users have knowledgeable about social spam in some kind....

    Provided By Iosrjournals

  • White Papers // Jun 2014

    GPRS Based LAN Monitoring and Controlling

    The GPRS based LAN monitoring and controlling system is mainly developed to focus on expansion of various networks services or facilities which are essential for brilliantly monitoring a LAN network. In this paper, workstations are collected to arrange them in a network. Managing and regulating the activities in the network...

    Provided By Iosrjournals

  • White Papers // Aug 2014

    Control of coding in DTNs for progressive packet arrivals dynamically

    In Delay Tolerant Networks (DTNs) the core challenge is to cope with lack of persistent connectivity and yet be able to deliver messages from source to destination. In particular, routing schemes that leverage relays' memory and mobility area customary solution in order to improve message delivery delay. When large files...

    Provided By Iosrjournals

  • White Papers // Aug 2014

    Resource Allocation in Cloud computing: A Comparative study

    Cloud computing is summed up as a different model for allowing favorable, network as per demand to use shared devices of computational resources which are collected and then released with marginal management effort or interaction with any client or any service provider. Cloud main objective is to cogitate on the...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Network Traffic Load Balancing In Gateways

    Load balancing is the practice of evenly distributing work among multiple devices. This technique provides several important benefits. Load balancing in gateways is a very important in today's emerging world. All the traffic of the computer network flows through the gateways of its network. A network gateway is an internetworking...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    An Efficient Hybrid Push-Pull Based Protocol for VOD In Peer-to-Peer network

    Video-on-demand is a service where movies are delivered to distributed users with low delay and free interactivity. The traditional client-server architecture experiences scalability issues to provide video streaming services. Peer-to-Peer (P2P) techniques for Video-On-Demand (VOD) have been shown to be a good enhancement to the traditional client/server methods when trying...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity

    In this paper, the authors discussed here is an Android messenger application which connects using Bluetooth. The main concepts discussed here are: Bluetooth connection between two or more android smart phones, whereby users can chat with each other, Bluetooth connection between a server and an android Smartphone, whereby the user...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Route maintenance and Scalability improvement of DSR, based on Relay node identification after locating Link-failure over MANET

    In dynamic source routing, each source determines the route to be used in transmitting its packets to destination. Route discovery determines the optimum path for a transmission between a given source and destination. Route maintenance ensures that the transmission path remains optimum and loop-free as network conditions change, even if...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Vampire Attacks: Wearing Out Life of Wireless Adhoc Sensor Networks

    Ad-hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. More security work in this area has focused mainly on denial of service attack at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Energy Consumption Using Network Stability And Multi-hop Protocol For Link Efficiency in Wireless Body Area Networks

    In this paper, the authors propose a minimum, power efficient and max throughput routing protocol for Wireless Body Area Networks (WBANs). They use multi-hop topology to achieve minimum energy consumption and longer network lifetime. They propose a cost function to select forwarder node. Proposed cost function selects a forwarder node...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Performance Evaluation of Zrp Star and Dsr under Vanets

    Vehicular Ad-hoc NETwork (VANET) is an extraordinary manifestation of MANET which is a vehicle to vehicle & vehicle roadside remote correspondence system, where nodes in VANET include themselves as servers or clients for trading & offering data. VANET (Vehicular Ad-hoc NETwork) could be another innovation that has taken gigantic consideration...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    An Insight to Data Stream Mining and other Emerging Learning Algorithms

    Significant advancements have been made in the field of data mining and knowledge discovery. But there is no universal algorithm that can be dynamic enough to extract information from a continuous data stream or from a large stored dataset. A combination of algorithms has to work cohesively in order for...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    A Novel Approach for Security Testing of Client Server Based Applications using Misuse Deployment Diagrams, Misuse Cases and Threat Trees

    Security testing is one of the most important security practices today. To secure an application it's important to go for a security testing phase during the development life cycle. Many useful enhancements are done using UML diagrams to model security like misuse cases, mis-sequence diagrams and misuse deployment diagrams etc....

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Use of Data Mining in Various Field: A Survey Paper

    Data mining is extracts the knowledge/information from a large amount of data which stores in multiple heterogeneous data base. Knowledge/information is conveying the message through direct or indirect. This paper provides a survey of various data mining techniques. These techniques include association, correlation, clustering and neural network. This paper also...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx

    DoS attacks today are part of every Internet user's life. As the Internet is growing - so is the vulnerability of the network. Companies now days are spending huge amount of money to protect their sensitive data from different attacks that they face. DoS or Denial of Service attacks are...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    An Intelligent Decision Support System Using Adaptive Network-Based Fuzzy Inference System (ANFIS) For Choosing Suitable Bank Loan Installments

    Choosing the best bank to obtain a loan from has become a dilemma for many loan applicants; Thus the need to automate the process throughout establishing an Intelligent Decision Support System (IDSS) to facilitate applicant's decision-making process. However, there are many types of IDSS to design the system but the...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Secure Keyword Search Using TRSE Scheme over Cloud Data

    Cloud computing is a pattern which is mainly necessary for outsourcing the data and also for sharing the computing resources. According to privacy it has been presented as an outsourcing of sensitive information. The searchable symmetric encryption is mainly focus on addressing the data privacy issues. The aspect of similarity...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Resource Aware Node Authentication Framework for Secure MANET

    MANET comprises mobile nodes, which are links to each other by wireless connections without any base infrastructure. MANETs are vulnerable to security attack due to their features such as autonomous nature, infrastructure-less network and multi-hop communication. Therefore every node in MANET must be secure; node security can be provided by...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    A Study on Mobile Telecom Network Traffic Using Mobility Pattern

    In the present the gradient adaptive protocol is to efficiently maintain a sequence at a particular geographic location in a light network of highly mobile nodes without using infrastructure networks. To keep information about the particular device, each mobile device passing that location will forward the information for a short...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    An Efficient Method to Prevent Information Leakage in Cloud

    The cloud computing is storing and accessing data and programs over the Internet instead of personal computers. It is a computing paradigm shift where computing is moved away from personal computers or an individual server to a cloud of computers. Its flexibility, cost-effectiveness, and dynamically re-allocation of resources as per...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    PARS: Position based Anonymous Routing Scheme in MANETs

    Mobile Ad hoc NETworks (MANET) comprises of self-organizing autonomous mobile nodes. MANETs are open and decentralized. Therefore they are vulnerable to malicious entities. MANETs are multi-hop wireless network where all nodes supportively maintain network connectivity without a centralized infrastructure. Since MANETs are infrastructure less and independent, the secure communication is...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    An Efficient Topology Search Mechanism for Unstructured Peer-To-Peer Networks

    Unstructured Peer-To-Peer (P2P) file-sharing networks are popular in the mass market. As the peers participating in unstructured networks interconnect randomly, they rely on flooding query messages to discover objects of interest and thus introduce remarkable network traffic. Empirical measurement studies indicate that the peers in P2P networks have similar preferences,...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    A Study of Various Spoofing Attacks and Attackers in Wireless Networks

    Wireless spoofing attacks are easy to launch and can significantly impact the performance of networks. Although the identity of a node can be verified through cryptographic authentication, conventional security approaches are not always desirable because of their overhead requirements. In this paper, the authors propose to use spatial information, a...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    A Tutorial of Mobile Ad-Hoc Network (Manet) Routing Protocols

    In mobile ad hoc network nodes dynamically forms networks, there is no any central infrastructure, and thus routing becomes a very important issue. Routing protocols used in Mobile Ad hoc NETworks (MANET) must adapt to frequent or continual changes of topology, while simultaneously limiting the impact of following these changes...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Enhancement of Security Levels Using a Secure Intrusion Detection System in Manets

    A Mobile Ad hoc NETwork (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. A security is an important issue for ad hoc networks, especially for those security-sensitive applications. Since there is no centralized infrastructure, MANET's are vulnerable to attackers. Prevention and...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Accessing Private Network via Firewall Based On Preset Threshold Value

    Many of the private services are made readily available to the users publically from emerging technologies such as web services, cloud computing, service-oriented architecture in an more effective and efficient manner. However, the users still suffer from security leakages by unauthorized one. Firewalls are the vital elements in network security....

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Securing IPv6s Neighbour and Router Discovery, using Locally Authentication Process

    Internet Protocol version six (IPv6), the next generation Internet Protocol (IP), exists sparsely in today's world. Internet Engineering Task Force (IETF), in IPv6, allowed nodes to auto configures using neighbor discovery protocol. Neighbor Discovery (ND) and address auto-configuration mechanisms may be protected with IPSec Authentication Header (AH). However, as it...

    Provided By Iosrjournals

  • White Papers // Jun 2014

    Survey of various routing approaches based on Quality-of-Service (QoS) criteria in MANET

    Now-a-days, Mobile Ad hoc NETworks (MANET) gained a lot of popularity in the research community. People realized that there is a commercial value in MANETs with the successful solutions of the most basic but important problems in network layer. Mostly all the applications that attracted interest in traditional wired networks...

    Provided By Iosrjournals

  • White Papers // Aug 2014

    Blue-Droid: An Intelligent Library Management System on Android Platform

    Bluetooth Library Manager (BLM) is library management software which can be used in any library for maintaining different functions like book search, requisition submission, data entry etc. The author has implemented this software on Android platform which has the advantage of portability and wide availability. The author used Bluetooth as...

    Provided By Iosrjournals

  • White Papers // Aug 2014

    Impact of Random Waypoint Mobility on Reactive Routing Protocols of Scalable Mobile Ad hoc Network

    Mobile ad hoc networks are the self-configuring network, in which there is no centralized access point. The mobile nodes itself act as routers for one another. MANET is basically a wireless ad hoc network with the routing capability. Scalability and mobility have measure impact on the behavior of ad hoc...

    Provided By Iosrjournals

  • White Papers // Aug 2014

    A Machine Learning Approach to Beaconing for Vehicular Ad Hoc Network (A Review)

    Vehicular Ad hoc NETwork (VANET) are classified as an application of Mobile Ad hoc NETwork (MANET) that has the potential in improving road safety and in providing traveler comfort. VANET is an emerging field of technology that allows vehicles to communicate together in the absence of fixed infrastructure. The basic...

    Provided By Iosrjournals

  • White Papers // Aug 2014

    Study of P2P Botnet

    Today, centralized botnets are still widely used. In a centralized botnet, bots are connected to several servers (called C&C servers) to obtain commands. This architecture is easy to construct and efficient in distributing botmaster's commands; however, it has a weak link - the C&C servers. Shutting down those servers would...

    Provided By Iosrjournals