IRD India

Displaying 1-40 of 145 results

  • White Papers // Dec 2014

    Dynamic Resource Scheduling & Monitoring in Cloud Computing

    Cloud computing allows clients to range upwards and downwards their resource convention based on requirements. Many of cloud versions come from resources multiplexing by using virtualization technology. To decrease energy wastage by idle server, the traditional way is to keep a server to sleep throughout unused period, with a alternative...

    Provided By IRD India

  • White Papers // Dec 2014

    Robust Node Clone Detection in Arbitrary Wireless Networks

    Wireless networks have an impact of responsiveness in ancient times as a result of their wide variety of vicinity. In general, WSNs include 100s or even 1000s of inexpensive, source constrained, scattered sensor nodes, which frequently spread within the scrutiny vicinity arbitrarily. Consider process upbringing is poor, protection mechanisms are...

    Provided By IRD India

  • White Papers // Dec 2014

    Automatic Vehicle Speed Control System Using Wireless Fidelity

    Globally road accident is considered to be an important issue, which can be reduced by proper vehicle speed monitoring system. More recently, the advancement in wireless sensor technology shows a great promise in designing Intelligent Transportation System (ITS) due to its flexibility and cost-effectiveness for deployment. This paper is to...

    Provided By IRD India

  • White Papers // Nov 2014

    Automatic Electrical Meter Reading System and Remote Monitoring Using Zigbee

    The automatic metering system is designed to make the prevailing electricity billing system simpler and efficient. The conventional metering system is done manually. An employee of the Electricity Board will be coming to take the reading and enter in the card. There are more chances of manual error, delay in...

    Provided By IRD India

  • White Papers // Nov 2014

    ICPS: Intelli Cloud Print Service

    When the authors observe the growing era of technical trends, there is a great push towards the cloud based applications and proliferation of web connected mobile devices. As there is a tremendous growth of smart phones/tablets, people are expecting the same capabilities of their PC's in their smart devices and...

    Provided By IRD India

  • White Papers // Nov 2014

    MIMO-OFDM Wireless Communications

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. It can be thought of as a combination of modulation and multiple access schemes that segment a communication channel in such a way that many users can share it. It segments according to frequency. It...

    Provided By IRD India

  • White Papers // Nov 2014

    State Predictive LQI Congestion Control for TCP/AQM Networks Considering Effective Equilibrium Points

    The purpose of this paper is to design state predictive LQI congestion controllers by considering effective equilibrium points of nonlinear models of TCP/AQM networks and to illustrate the effectiveness of the designed congestion controllers via the NS-2 (Network Simulator ver.2) simulator. First nonlinear models of TCP/AQM networks are linearized at...

    Provided By IRD India

  • White Papers // Oct 2014

    Node Pairs Discovery Algorithm - Tracking Mechanism for VANET

    The purpose of V2I communication, a major component of VANET has been introduced already for improved transport infrastructure by minimizing collisions, traffic jams and improved management of operations for safety of traffic on a dense road scenario. The authors' incorporation would be aiming at establishment of a Node Pairs Discovery...

    Provided By IRD India

  • White Papers // Oct 2014

    Cooperative Game Theory Approach for the Cognitive Radio Users

    Wireless mobile communication plays a vital role in the people life. The facility of anywhere anytime communication services availability can be handled by management of resources efficiently. The quality of service offered to users may be enhanced through innovative protocols and new technologies. Future trends in wireless computing should take...

    Provided By IRD India

  • White Papers // Oct 2014

    A Survey on SaaS Related Security Issues in Cloud Computing

    Internet has been a driving force towards the various technologies that have been developed since its inception, cloud computing paradigm has witnessed an enormous shift towards its adoption and it has become a trend in the information technology space as it promises significant cost reductions and new business potential to...

    Provided By IRD India

  • White Papers // Oct 2014

    Pattern Based Attendance System Using RF Module

    In this paper, the authors aim at implementing biometric capable technology that can be used in automating the entire attendance system for the students pursuing courses at an educational institute. The goal can be disintegrated into finer sub-targets; fingerprint capture, identification, and wireless transfer of identification information. For each sub-task,...

    Provided By IRD India

  • White Papers // Oct 2014

    Adaptive Defect Detection Framework for Software Developed Under Environmental Heterogeneity

    Traditional testing methods are not successful in detecting concealed flaws in tough embedded software like device drivers or file systems. This leads to a huge expenditure through maintenance cost to the industrialist. In order to overcome this limitation of the traditional testing methods, with a great analysis model checking techniques...

    Provided By IRD India

  • White Papers // Oct 2014

    Different IaaS Security Attributes and Comparison of Different Cloud Providers

    Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction. Despite such promises, cloud computing has not been...

    Provided By IRD India

  • White Papers // Oct 2014

    Cloud Computing: A New Paradigm in Utility Computing

    Cloud computing can be regarded as integration of various computing technologies which offered better utilization of resources but could not achieve optimized performance. Cloud computing made use of all existing technologies like grid and utility, including internet to deliver infrastructure, applications and business processes as services to its users. It...

    Provided By IRD India

  • White Papers // Sep 2014

    Intrusion Detection System Using Cascade Forward Neural Network with Genetic Algorithm Based Feature Selection

    Due to the rapid expansion and advancements of computer network, security has become a vital issue for modern computer network. The network intrusion detection systems play the vital role in protecting the computer networks. So, it has become a significant research issue. In spite of notable progress in intrusion detection...

    Provided By IRD India

  • White Papers // Sep 2014

    Design & Modification of RSA Algorithm with CRT & OAEP

    In many RSA cryptosystems, the authors usually select a small value for the public key e. This kind of choice can only speed up the encryption operation but do not forget that by this way, the corresponding decryption operation requires more computational time and therefore it costs more because of...

    Provided By IRD India

  • White Papers // Sep 2014

    Data Compression in Wireless Sensor Nodes Used for Data Acquisition of Slowly Changing Digital Events

    Energy conservation is an important consideration in Wireless Multimedia Networks (WMNs) powered by batteries. Energy optimization directly leads to increased lifetime of a WSN. In this paper, the authors consider a class of WSNs deployed to sense digital events and transmit the state values to a sink node. In these...

    Provided By IRD India

  • White Papers // Sep 2014

    8-Block Security System for Digital Envelope

    The sensitive information stored on computers and transmitted over the Internet need to ensure information security and safety measures. Without the authors' knowledge, the intruders sneak into the systems, misuse it and even create back doors to their computer systems. System contains valuable information which should not be in hands...

    Provided By IRD India

  • White Papers // Aug 2014

    Fuzzy Designing and Scheduling of Automotive ECUs Over Controller Area Network

    The technological advancements of embedded system and electronics within the vehicle are being driven by the challenge to make the vehicle safer, more energy efficient and networked. Implementation of Automotive tasks has become easier with various advancement in software and hardware design modules. These Automotive tasks are implemented on a...

    Provided By IRD India

  • White Papers // Aug 2014

    Control System for Robotic Arms Over Controller Area Network (CRACAN)

    The most known network protocols for embedded systems are Event-Triggered Protocol (ETP) and Time-Triggered Protocol (TTP), which provide their own advantages of using them. Currently event-triggered protocol is used in vehicles, which means that in principle all activities are invoked by an event; most messages are transmitted periodically to the...

    Provided By IRD India

  • White Papers // Aug 2014

    Mobility Based Key Management Scheme of Wireless Sensor Network

    In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink...

    Provided By IRD India

  • White Papers // Aug 2014

    Cybercrime Analysis and Data Mining Methodologies

    Crime is identified as an act which is punishable by legislation in accordance with Thakur. However, an act that is considered as a crime in one place and time may not be true in another place or time. In this paper, the authors presented about the crime data mining a...

    Provided By IRD India

  • White Papers // Aug 2014

    A Novel Symmetric Key Cryptography Based on Doubly Even Order Magic Square

    Now-a-days with the global acceptance of the Internet, the people communication becomes faster and easier. Every computer is connected virtually to every other through internet. Therefore, cryptography becomes a crucial aspect for secure communication to protect important data from eavesdroppers. In this paper, a session based bit level symmetric key...

    Provided By IRD India

  • White Papers // Aug 2014

    Efficient Hierarchical Based Routing Protocol Enhancement for Energy Balancing and Prolonging the Lifetime of the WSNs

    Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous tiny computing devices, each equipped with sensors, a wireless radio, a processor, and a power source. Sensor networks are envisioned to be deployed in the physical environment in order to monitor a wide range of environmental phenomena....

    Provided By IRD India

  • White Papers // Aug 2014

    Distance Based Node Election for Energy Efficient Routing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a form of ad hoc network consisting of tens to thousands of distributed autonomous tiny computing devices each equipped with sensors, a wireless radio, a processor, and a power source. Because of military applications such as battlefield surveillance the wireless sensor networks are originally...

    Provided By IRD India

  • White Papers // Aug 2014

    Enhanced File Security Using Encryption and Splitting Technique Over Multi-Cloud Environment

    Cloud computing is a fastest growing technology. It allows business organizations to use or access different applications, store information without access their personal files. While considering the power, stability and the security of cloud one can't ignore different threats to user's data on cloud storage. File access assure in real...

    Provided By IRD India

  • White Papers // Aug 2014

    Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic Applications in MANETs

    Security in Mobile Ad hoc NETworks (MANETs) is a critical issue. MANETs are vulnerable to different types of attacks. Many of the routing attacks have been identified at network layer such as black hole, worm hole, gray hole and byzantine attacks. Out of all these attacks, black hole is the...

    Provided By IRD India

  • White Papers // Aug 2014

    LAN Based Secured Active Data Dissemination in Mobile Social Networks

    In Mobile Social Networks (MSNets), data dissemination is very important, which has not been widely investigated yet. Active data dissemination is a networking paradigm where a superuser intentionally facilitates the connectivity in the network. One of the key challenges is how to design the most efficient superuser route to achieve...

    Provided By IRD India

  • White Papers // Jul 2014

    Threshold Based Intrusion Detection System for MANET Using Machine Learning Approach

    Ad hoc nature of Mobile Ad hoc NETwork makes MANET most promising communication model in rescue and military areas. Its dynamicity property and infrastructure less deployment invites attacker (insider or outsider) to disrupt the MANET. Hosts itself as a router makes cooperation better but finding the route has inherent weakness...

    Provided By IRD India

  • White Papers // Jul 2014

    Bandwidth Efficient Remote Video Surveillance System

    In this paper, the authors present an experimental work on video surveillance system which is capable of monitoring a desired room for security purpose. The system will continuously keep track of particular location with help of camera installed and obtain database of image frames from video. Adjacent frames are compared...

    Provided By IRD India

  • White Papers // Jul 2014

    A Distributed Channel Assignment Algorithm for Uncoordinated WLANs

    Campus and enterprise wireless networks are increasingly characterized by ubiquitous coverage and rising traffic demands. Efficiently assigning channels to Access Points (APs) in these networks can significantly affect the performance and capacity of the WLANs. In this paper, communication efficiency can be improved significantly by using a distributed channel assignment...

    Provided By IRD India

  • White Papers // Jul 2014

    Examining Search-Based Algorithms in Software Testing

    Software testing is a way of improving software quality. It is an essential and an expensive phase of Software Development Life Cycle (SDLC). There has been an ongoing research in this field to automate the process of software testing so that expenses can be reduced. But size and complexity of...

    Provided By IRD India

  • White Papers // Jul 2014

    A Framework to Avoid Vulnerability Incidents in Cloud Computing

    One of the latest drift in small and medium businesses and enterprise sized IT is the need for a significant transformation of the IT environment. Cloud computing provides a major shift in the way companies see the IT infrastructure. It is an emerging style of computing where applications, data and...

    Provided By IRD India

  • White Papers // Jul 2014

    FPGA Implementation of Data Encryption and Decryption Using Optimized LED Algorithm

    In this paper, the authors present Light weight Encryption Device (LED) on Field Programmable Gate Array (FPGA). An optimized code for the light weight encryption algorithm with 128 bits key size and 64 bits block size has been developed. They have designed iterative architecture for speed improvements and hardware elements...

    Provided By IRD India

  • White Papers // Jul 2014

    Comparative Study of Data Mining Clustering Algorithms

    Clustering is the process of grouping physical or abstract objects into classes of similar objects. These groups of similar objects are called clusters. Objects in one cluster are very similar to other objects in that particular cluster but very dissimilar when compared to objects in other clusters. Portraying data by...

    Provided By IRD India

  • White Papers // Jun 2014

    Comparative Study of Duty Cycle and Network Coding Based Analysis of Lifetime for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of autonomous sensor nodes which are equipped with limited battery and requires energy management for enhanced Network Lifetime. The area around the sink forms a bottleneck zone due to heavy traffic-flow will be in demand of more power which limits the network lifetime. This paper...

    Provided By IRD India

  • White Papers // May 2014

    Using Proxies to Facilitate Collaboration in Multi-Cloud Computing Environments

    As cloud computing becomes more predominant, the problem of scalability has become critical for cloud computing providers. For the client to be able to simultaneously use services from multiple clouds; individually interaction with each cloud service provider, gathering intermediate results, processing the collective data, and generating final results is necessary....

    Provided By IRD India

  • White Papers // Apr 2014

    Denial of Service Attacks in Wireless Sensor Networks

    Network survivability is the capacity of a network keeping connected under loss and intrusions, which is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses about...

    Provided By IRD India

  • White Papers // Apr 2014

    Survey on Various Congestion Detection and Control Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSN's) are expected to have wide range of applications and increasing deployment in the near future as it provides a low cost solution with respect to both maintenance and installation. WSN's are distributed self-governing sensors used to monitor the physical conditions of the environment. They are constructed...

    Provided By IRD India

  • White Papers // Apr 2014

    DSA - A Reliable Intrusion-Detection System for MANETs

    MANET (Mobile Ad hoc NETwork) meant to be work under the Infrastructure less medium; it suffers from the limited bandwidth, dynamic topology problems etc. There is no base station or central control for the network and all nodes work autonomously. These characteristics are highly favorable for malicious user to entering...

    Provided By IRD India

  • White Papers // Aug 2013

    Predictable Testing of Phishing Websites Based on Deportment Model Approach

    A phishing attack is a criminal activity which mimics a certain legitimate webpage using a fake webpage with an intention of luring end-users to visit the fake website thereby stealing their personal information such as usernames, passwords and other personal details such as credit card information. An attacker might generate...

    Provided By IRD India

  • White Papers // Aug 2013

    Live Virtual Machine Migration Based on Cow Checkpointing Using XEN Hypervisor

    Live Virtual Machine (VM) migration usually involves migrating physical memory image, the network connections and virtual device state. Live migration has been proposed to reduce the downtime of migrating the virtual machine from host to destination by encountering pre-copy approach. If dirty memory generation is high, it takes long time...

    Provided By IRD India

  • White Papers // Aug 2013

    Outlier Detection for Large Datasets

    Finding outlier or anomaly in large dataset is an important problem in areas such as electronic commerce, credit card fraud, and even the analysis of performance statistics of professional athletes. The identification of outliers can lead to the discovery of truly unexpected knowledge. LOF (Local Outlier Factor) is a classical...

    Provided By IRD India

  • White Papers // Aug 2013

    Hybrid Technique for Human Identification Using Information Theory

    Humans can be individualized based on their facial characteristics. However, identifying a face becomes a challenging task due to the complexities involved. The Visual models of face include many parameters. In this paper different algorithms and parameters are studied and computed for real time results. The combined PCA and geometric...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of Multi-Threaded Pipelined Aes Crypto Processor

    In this paper, the authors present AES algorithm implementation using multi-threaded and pipelining concept for faster data encryption and its physical implementation using 40nm technology. AES crypto-algorithm is widely used in secured wireless communications, zigbee, Electronic financial transactions, content protection, digital rights, set-top boxes etc. The AES algorithm is symmetric...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack

    Mobile Ad-hoc NETwork (MANET) is a group of wireless mobile nodes connected to each other without any central administrator. Nodes can move from one place to another in the network or may leave or join the network at any time. Due to this the topology of the network changes rapidly....

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of 128 Bit Key Rc5 Cipher

    In this paper, the authors present the design of RC5 algorithm and its physical design implementation. The RC5 cryptographic algorithm is widely used in wireless communication networks like WSAN and WBSN. RC5 is a fast block cipher, developed by RSA security, which exploits data rotation to achieve a high level...

    Provided By IRD India

  • White Papers // Apr 2014

    Survey on Various Congestion Detection and Control Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSN's) are expected to have wide range of applications and increasing deployment in the near future as it provides a low cost solution with respect to both maintenance and installation. WSN's are distributed self-governing sensors used to monitor the physical conditions of the environment. They are constructed...

    Provided By IRD India

  • White Papers // Apr 2014

    DSA - A Reliable Intrusion-Detection System for MANETs

    MANET (Mobile Ad hoc NETwork) meant to be work under the Infrastructure less medium; it suffers from the limited bandwidth, dynamic topology problems etc. There is no base station or central control for the network and all nodes work autonomously. These characteristics are highly favorable for malicious user to entering...

    Provided By IRD India

  • White Papers // Aug 2014

    Efficient Hierarchical Based Routing Protocol Enhancement for Energy Balancing and Prolonging the Lifetime of the WSNs

    Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous tiny computing devices, each equipped with sensors, a wireless radio, a processor, and a power source. Sensor networks are envisioned to be deployed in the physical environment in order to monitor a wide range of environmental phenomena....

    Provided By IRD India

  • White Papers // Aug 2014

    Distance Based Node Election for Energy Efficient Routing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a form of ad hoc network consisting of tens to thousands of distributed autonomous tiny computing devices each equipped with sensors, a wireless radio, a processor, and a power source. Because of military applications such as battlefield surveillance the wireless sensor networks are originally...

    Provided By IRD India

  • White Papers // Apr 2014

    Spam E-Mail Detection by Random Forests Algorithm

    Spam officially called unsolicited bulk email or unsolicited commercial email, which is rapidly becoming a major problem on the Internet. It is an attempt to deliver a message, over the Internet, to someone who would not otherwise to receive it. These junk emails may contain various types of message such...

    Provided By IRD India

  • White Papers // Apr 2014

    Privacy and Integrity Preserving on Range Queries in Sensor Networks

    In two tiered architecture of sensor networks, the storage node serves as an intermediate tier between the sensor and the sink during storing data and processing queries. This model is widely adopted due to its processing efficiency and power saving and storing benefits. However, the storage node becomes attractive for...

    Provided By IRD India

  • White Papers // Aug 2014

    Mobility Based Key Management Scheme of Wireless Sensor Network

    In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink...

    Provided By IRD India

  • White Papers // Aug 2014

    Cybercrime Analysis and Data Mining Methodologies

    Crime is identified as an act which is punishable by legislation in accordance with Thakur. However, an act that is considered as a crime in one place and time may not be true in another place or time. In this paper, the authors presented about the crime data mining a...

    Provided By IRD India

  • White Papers // Aug 2014

    Enhanced File Security Using Encryption and Splitting Technique Over Multi-Cloud Environment

    Cloud computing is a fastest growing technology. It allows business organizations to use or access different applications, store information without access their personal files. While considering the power, stability and the security of cloud one can't ignore different threats to user's data on cloud storage. File access assure in real...

    Provided By IRD India

  • White Papers // Aug 2014

    A Novel Symmetric Key Cryptography Based on Doubly Even Order Magic Square

    Now-a-days with the global acceptance of the Internet, the people communication becomes faster and easier. Every computer is connected virtually to every other through internet. Therefore, cryptography becomes a crucial aspect for secure communication to protect important data from eavesdroppers. In this paper, a session based bit level symmetric key...

    Provided By IRD India

  • White Papers // Jul 2014

    FPGA Implementation of Data Encryption and Decryption Using Optimized LED Algorithm

    In this paper, the authors present Light weight Encryption Device (LED) on Field Programmable Gate Array (FPGA). An optimized code for the light weight encryption algorithm with 128 bits key size and 64 bits block size has been developed. They have designed iterative architecture for speed improvements and hardware elements...

    Provided By IRD India

  • White Papers // Jul 2014

    Comparative Study of Data Mining Clustering Algorithms

    Clustering is the process of grouping physical or abstract objects into classes of similar objects. These groups of similar objects are called clusters. Objects in one cluster are very similar to other objects in that particular cluster but very dissimilar when compared to objects in other clusters. Portraying data by...

    Provided By IRD India

  • White Papers // Jul 2014

    A Distributed Channel Assignment Algorithm for Uncoordinated WLANs

    Campus and enterprise wireless networks are increasingly characterized by ubiquitous coverage and rising traffic demands. Efficiently assigning channels to Access Points (APs) in these networks can significantly affect the performance and capacity of the WLANs. In this paper, communication efficiency can be improved significantly by using a distributed channel assignment...

    Provided By IRD India

  • White Papers // Jul 2014

    Examining Search-Based Algorithms in Software Testing

    Software testing is a way of improving software quality. It is an essential and an expensive phase of Software Development Life Cycle (SDLC). There has been an ongoing research in this field to automate the process of software testing so that expenses can be reduced. But size and complexity of...

    Provided By IRD India

  • White Papers // Aug 2014

    LAN Based Secured Active Data Dissemination in Mobile Social Networks

    In Mobile Social Networks (MSNets), data dissemination is very important, which has not been widely investigated yet. Active data dissemination is a networking paradigm where a superuser intentionally facilitates the connectivity in the network. One of the key challenges is how to design the most efficient superuser route to achieve...

    Provided By IRD India

  • White Papers // Mar 2014

    Reduced Transmission of Application Information Security on Android with Synchronization

    In present days, mobile phones which use android operating system is equipped with richer applications than mobile phones with traditional operating system. These makes user to store most of the information on mobile phones. The mobile phones with android operating system need to be upgrades with latest version of its...

    Provided By IRD India

  • White Papers // Mar 2014

    IEEE 802.11ac: Enhancing Throughput and MAC Layer Performance With Rate Adaptation Algorithm

    The IEEE 802.11ac is an emerging Very High Throughput (VHT) WLAN standard, targeted to achieve data rates close to 6.9 Gbps for 5GHz spectrum band. The paper presents the throughput analysis of 802.11ac MAC layer with help of rate adaptation algorithm to show efficacy of 802.11ac over 802.11n WLAN standard...

    Provided By IRD India

  • White Papers // Apr 2014

    Denial of Service Attacks in Wireless Sensor Networks

    Network survivability is the capacity of a network keeping connected under loss and intrusions, which is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses about...

    Provided By IRD India

  • White Papers // Feb 2014

    Two Factor Framework for Web Based Social Network Based on PKI

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. and it must protected by assigning a password to gain unauthorized access to that data, because the privacy, integrity and confidentiality are the most important...

    Provided By IRD India

  • White Papers // Feb 2014

    Address Allocation in Manet - A Literature Survey

    A mobile ad hoc network is a network with nodes which are self-configuring and that route the messages themselves. Hence, there is no need for additional infrastructure to build the network. However, lack of infrastructure makes the address allocation in the ad hoc network difficult. There are events like partitioning,...

    Provided By IRD India

  • White Papers // Feb 2014

    Big Data Intelligence on Logistics

    The logistics industry is competing in a changing and continuously challenging world. As the people economy is moving into this new information age, logistics industries are facing a lot of challenges as well as opportunities. The advancement of e-commerce and evolution of new data sources like sensors; GPS, Smartphone's etc...

    Provided By IRD India

  • White Papers // Feb 2014

    An Efficient Provision of Selfadaptive Multi Media Streaming Service for Android Phones

    Mobile devices now-a-days are widespread and provide great multimedia capabilities, which provide the efficient delivery of live video streaming. Multimedia information can be obtained easily using mobile devices, allowing users to enjoy ubiquitous network services. Cloud multimedia streaming have disruptively occupied bandwidth in wireless network, which poses many challenges in...

    Provided By IRD India

  • White Papers // Aug 2013

    Fusion Based Energy Detection in Cognitive Radio Networks

    Due to the increase in the usage of wireless devices and the consequent spectrum allocation, radio spectrum is becoming scarce. Cognitive Radio (CR) has been proposed to exploit the presence of the spectrum holes. To use the unused spectrum, spectrum sensing is need to know if the primary user (licensed...

    Provided By IRD India

  • White Papers // Aug 2013

    Automated Ticket Vending System Using RFID Tags

    In present situation, the ticketing system is more tedious. People are standing in long queues for getting tickets especially in public mode of transportation. This leads to unnecessary time wastage and energy waste. Some people use automated ticket vending machine. But then ATVM machines are not so successful in all...

    Provided By IRD India

  • White Papers // Aug 2013

    Microstrip Antenna for GPS Band

    In recent years, microstrip antennas have received much attention and have become one of the most successful topics in the telecommunications field. This success stems from well-known advantages, such as, low profile, low cost, ease of construction, conformal geometry and flexibility in terms of radiation pattern, gain and polarization. The...

    Provided By IRD India

  • White Papers // Aug 2013

    SMS Based Wireless E-Notice Board

    In this paper, the authors explain about SMS based wireless e-notice board and how to establish an effective and reliable communication between a mobile phone and a microcontroller using GSM modem. This GSM based e-notice board has various applications used in several domains including banks, stoke exchanges, traffic control, public...

    Provided By IRD India

  • White Papers // Aug 2013

    QualNet Simulation of VANET Scenario for TLE (Traffic Light Environment) Performance Evaluation

    Vehicular Ad-hoc NETworks (VANETs) are attracting considerable attention from the research community and the automotive industry to improve the services of Intelligent Transportation System (ITS). As today's transportation system faces serious challenges in terms of road safety, efficiency, and environmental friendliness, the idea of so called \"ITS\" has emerged. Due...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Evaluation of Node Disjoint Multipath Routing Protocol Based on AODV for MANETs

    Mobile Ad-hoc NETworks (MANETs) is a collection of mobile nodes that can communicate with each other using multi-hop wireless links without utilizing any fixed base station infrastructure and centralized management. MANETs are typically characterized by dynamic topology, high node mobility, low channel bandwidth, limited battery power and frequent link failures,...

    Provided By IRD India

  • White Papers // Aug 2013

    Probabilistic Approach Towards Sustaining Higher Performance Indicators in WSN

    Wireless sensor networks are a class of distributed systems that sense their data from the surroundings in real time. Compared with the traditional wireless networks, wireless sensor networks have energy constraints, low-data-rate of high redundant and data flow of high-to-one, and so on. Energy effectiveness is the key performance indicators...

    Provided By IRD India

  • White Papers // Apr 2014

    A Survey on Energy Conservation Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have been a growing domain of research for the past few decades. The tasks performed by this network is basically sensing of required data as per the application by the deployed sensor nodes, collecting and processing the required data and forwarding the data of interest to...

    Provided By IRD India

  • White Papers // Jul 2014

    Threshold Based Intrusion Detection System for MANET Using Machine Learning Approach

    Ad hoc nature of Mobile Ad hoc NETwork makes MANET most promising communication model in rescue and military areas. Its dynamicity property and infrastructure less deployment invites attacker (insider or outsider) to disrupt the MANET. Hosts itself as a router makes cooperation better but finding the route has inherent weakness...

    Provided By IRD India

  • White Papers // Jul 2014

    Bandwidth Efficient Remote Video Surveillance System

    In this paper, the authors present an experimental work on video surveillance system which is capable of monitoring a desired room for security purpose. The system will continuously keep track of particular location with help of camera installed and obtain database of image frames from video. Adjacent frames are compared...

    Provided By IRD India

  • White Papers // Aug 2014

    Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic Applications in MANETs

    Security in Mobile Ad hoc NETworks (MANETs) is a critical issue. MANETs are vulnerable to different types of attacks. Many of the routing attacks have been identified at network layer such as black hole, worm hole, gray hole and byzantine attacks. Out of all these attacks, black hole is the...

    Provided By IRD India