IRD India

Displaying 1-40 of 200 results

  • White Papers // Feb 2015

    16-Bit Low Power Booth Encoded Multiplier Design Using GDI CMOS Logic

    Gate Diffusion Input (GDI) a new technique of designing a low-power digital combinational circuit is described. The technique allows reducing power consumption, propagation delay and area of digital circuits while maintaining low complexity of logic design. The GDI approach allows implementation of a wide range of complex logic functions using...

    Provided By IRD India

  • White Papers // Jan 2015

    Design of Low Power Digital CMOS Comparator

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The Comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of 4X4 Vedic Multiplier Using Power Gating Method

    In this paper, the authors propose a various multipliers implemented using CMOS logic style and their comparative analysis on the basis of power and PDP (Power Delay Product). A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively...

    Provided By IRD India

  • White Papers // Dec 2014

    Delay Redundant Multi Operand Adder Using Cyclic Combinational Method

    In this paper, the authors propose the efficient implementation of multioperand redundant compressor trees in modern FPGAs by using their fast carry resources. Their approaches strongly reduce delay and they generally present no area overhead compared to a CPA tree. Moreover, they could be defined at a high level based...

    Provided By IRD India

  • White Papers // Dec 2014

    Dynamic Resource Scheduling & Monitoring in Cloud Computing

    Cloud computing allows clients to range upwards and downwards their resource convention based on requirements. Many of cloud versions come from resources multiplexing by using virtualization technology. To decrease energy wastage by idle server, the traditional way is to keep a server to sleep throughout unused period, with a alternative...

    Provided By IRD India

  • White Papers // Dec 2014

    Robust Node Clone Detection in Arbitrary Wireless Networks

    Wireless networks have an impact of responsiveness in ancient times as a result of their wide variety of vicinity. In general, WSNs include 100s or even 1000s of inexpensive, source constrained, scattered sensor nodes, which frequently spread within the scrutiny vicinity arbitrarily. Consider process upbringing is poor, protection mechanisms are...

    Provided By IRD India

  • White Papers // Dec 2014

    Adaptive Supply Voltage for Combinational Circuits Using MPR

    VLSI circuits of the 45-nm technology and beyond are increasingly affected by process variations as well as aging effects. Overcoming the variations inevitably requires additional power expense, which in turn aggravates the power and heat problem. Adaptive Supply Voltage (ASV) is an arguably power efficient approach for variation resilience since...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of a High Performance Multiplier Using MT-CMOS Technique

    A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively large. This paper proposed a high performance and power efficient 8x8 multiplier design based on Vedic mathematics using CMOS logic style. In this paper, XNOR gates with MTCMOS...

    Provided By IRD India

  • White Papers // Dec 2014

    Automatic Vehicle Speed Control System Using Wireless Fidelity

    Globally road accident is considered to be an important issue, which can be reduced by proper vehicle speed monitoring system. More recently, the advancement in wireless sensor technology shows a great promise in designing Intelligent Transportation System (ITS) due to its flexibility and cost-effectiveness for deployment. This paper is to...

    Provided By IRD India

  • White Papers // Nov 2014

    Design of Low Power Scalable Digital CMOS Comparator Using a Parallel Prefix Tree

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Nov 2014

    Automatic Electrical Meter Reading System and Remote Monitoring Using Zigbee

    The automatic metering system is designed to make the prevailing electricity billing system simpler and efficient. The conventional metering system is done manually. An employee of the Electricity Board will be coming to take the reading and enter in the card. There are more chances of manual error, delay in...

    Provided By IRD India

  • White Papers // Nov 2014

    ICPS: Intelli Cloud Print Service

    When the authors observe the growing era of technical trends, there is a great push towards the cloud based applications and proliferation of web connected mobile devices. As there is a tremendous growth of smart phones/tablets, people are expecting the same capabilities of their PC's in their smart devices and...

    Provided By IRD India

  • White Papers // Nov 2014

    A Novel Test Pattern Generator for Functional Broadside Tests

    In this paper, an accumulator-based 3-weight test pattern generation scheme is presented. The proposed scheme copes with the inherent drawbacks of the scheme proposed more precisely. First, it does not impose any requirements about the design of the adder i.e., it can be implemented using any adder design and then...

    Provided By IRD India

  • White Papers // Nov 2014

    Design and Implementation of 2-Digit Adder Using Quaternary Signed Digit Number System

    With the quaternary signed digit number system one may perform carry free addition, borrow free subtraction and multiplication. But with the binary number system, the computational speed is limited by formation and propagation of carry especially as the number of bits increases. However, the QSD number system requires a different...

    Provided By IRD India

  • White Papers // Nov 2014

    Designing of Ripple Carry Adder Using Domino Logic

    In this paper, new design a proposed logic design targeting at full-custom high speed applications. The constant delay characteristic of this logic style regardless of the logic expression makes it suitable in implementing complicated logic expression such as addition. This feature enables performance advantage over static and dynamic, CD logic...

    Provided By IRD India

  • White Papers // Nov 2014

    MIMO-OFDM Wireless Communications

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. It can be thought of as a combination of modulation and multiple access schemes that segment a communication channel in such a way that many users can share it. It segments according to frequency. It...

    Provided By IRD India

  • White Papers // Nov 2014

    A High Performance CRC Checker for Ethernet Application

    In this paper, the authors present the generation of Cycle Redundancy Check (CRC) in the field of data communication and networking. CRCs are popular because they are simple to implement in binary hardware, are easy to analyze mathematically, and are particularly good at detecting common errors caused by noise in...

    Provided By IRD India

  • White Papers // Nov 2014

    Design Low-Power Pulse-Triggered Flip-Flop Design Based on a Signal Feed-Through Scheme

    In this paper, analysis of average power, delay and power delay product is done by shift register using 90 nm technology. Low power flip-flops are crucial for the design of low-power digital systems. As Metal Oxide Semiconductor Field Effect Transistor (MOSFET) devices are scaled down to nanometer ranges, Complementary MOS...

    Provided By IRD India

  • White Papers // Nov 2014

    A Digital CMOS Parallel Counter Architecture

    In this paper, the authors consist of the state look-ahead path and the counting path. The proposed counter is a single mode counter, which sequences through a fixed set of pre assigned count states, of which each next count state represents the next counter value in sequence. The counter is...

    Provided By IRD India

  • White Papers // Nov 2014

    Asynchronous Design of Energy Efficient Parallel Adder

    In this paper, the authors present power analysis of the 4 bit Parallel adder reported as having a low PDP (Power Delay Product), by means of speed, power consumption and area. The full adders were designed upon various logic styles to derive the sum and carry outputs. The conventional 4...

    Provided By IRD India

  • White Papers // Nov 2014

    State Predictive LQI Congestion Control for TCP/AQM Networks Considering Effective Equilibrium Points

    The purpose of this paper is to design state predictive LQI congestion controllers by considering effective equilibrium points of nonlinear models of TCP/AQM networks and to illustrate the effectiveness of the designed congestion controllers via the NS-2 (Network Simulator ver.2) simulator. First nonlinear models of TCP/AQM networks are linearized at...

    Provided By IRD India

  • White Papers // Oct 2014

    Node Pairs Discovery Algorithm - Tracking Mechanism for VANET

    The purpose of V2I communication, a major component of VANET has been introduced already for improved transport infrastructure by minimizing collisions, traffic jams and improved management of operations for safety of traffic on a dense road scenario. The authors' incorporation would be aiming at establishment of a Node Pairs Discovery...

    Provided By IRD India

  • White Papers // Oct 2014

    Cooperative Game Theory Approach for the Cognitive Radio Users

    Wireless mobile communication plays a vital role in the people life. The facility of anywhere anytime communication services availability can be handled by management of resources efficiently. The quality of service offered to users may be enhanced through innovative protocols and new technologies. Future trends in wireless computing should take...

    Provided By IRD India

  • White Papers // Oct 2014

    A Survey on SaaS Related Security Issues in Cloud Computing

    Internet has been a driving force towards the various technologies that have been developed since its inception, cloud computing paradigm has witnessed an enormous shift towards its adoption and it has become a trend in the information technology space as it promises significant cost reductions and new business potential to...

    Provided By IRD India

  • White Papers // Oct 2014

    Pattern Based Attendance System Using RF Module

    In this paper, the authors aim at implementing biometric capable technology that can be used in automating the entire attendance system for the students pursuing courses at an educational institute. The goal can be disintegrated into finer sub-targets; fingerprint capture, identification, and wireless transfer of identification information. For each sub-task,...

    Provided By IRD India

  • White Papers // Oct 2014

    Different IaaS Security Attributes and Comparison of Different Cloud Providers

    Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction. Despite such promises, cloud computing has not been...

    Provided By IRD India

  • White Papers // Oct 2014

    Adaptive Defect Detection Framework for Software Developed Under Environmental Heterogeneity

    Traditional testing methods are not successful in detecting concealed flaws in tough embedded software like device drivers or file systems. This leads to a huge expenditure through maintenance cost to the industrialist. In order to overcome this limitation of the traditional testing methods, with a great analysis model checking techniques...

    Provided By IRD India

  • White Papers // Oct 2014

    Cloud Computing: A New Paradigm in Utility Computing

    Cloud computing can be regarded as integration of various computing technologies which offered better utilization of resources but could not achieve optimized performance. Cloud computing made use of all existing technologies like grid and utility, including internet to deliver infrastructure, applications and business processes as services to its users. It...

    Provided By IRD India

  • White Papers // Sep 2014

    Intrusion Detection System Using Cascade Forward Neural Network with Genetic Algorithm Based Feature Selection

    Due to the rapid expansion and advancements of computer network, security has become a vital issue for modern computer network. The network intrusion detection systems play the vital role in protecting the computer networks. So, it has become a significant research issue. In spite of notable progress in intrusion detection...

    Provided By IRD India

  • White Papers // Sep 2014

    Design of High Speed and Low Power 5:3 Compressor Architectures Using Novel Two Transistor XOR Gates

    In this paper, the authors propose architectures of 5:3 compressor designs for low power multiplication purposes. The architecture explores the essence of two transistor multiplexer design and novel two transistor XOR gates for the proposed topology with least number of transistors for logic level implementation. The modified and proposed compressor...

    Provided By IRD India

  • White Papers // Sep 2014

    Design & Modification of RSA Algorithm with CRT & OAEP

    In many RSA cryptosystems, the authors usually select a small value for the public key e. This kind of choice can only speed up the encryption operation but do not forget that by this way, the corresponding decryption operation requires more computational time and therefore it costs more because of...

    Provided By IRD India

  • White Papers // Sep 2014

    Data Compression in Wireless Sensor Nodes Used for Data Acquisition of Slowly Changing Digital Events

    Energy conservation is an important consideration in Wireless Multimedia Networks (WMNs) powered by batteries. Energy optimization directly leads to increased lifetime of a WSN. In this paper, the authors consider a class of WSNs deployed to sense digital events and transmit the state values to a sink node. In these...

    Provided By IRD India

  • White Papers // Sep 2014

    8-Block Security System for Digital Envelope

    The sensitive information stored on computers and transmitted over the Internet need to ensure information security and safety measures. Without the authors' knowledge, the intruders sneak into the systems, misuse it and even create back doors to their computer systems. System contains valuable information which should not be in hands...

    Provided By IRD India

  • White Papers // Aug 2014

    Control System for Robotic Arms Over Controller Area Network (CRACAN)

    The most known network protocols for embedded systems are Event-Triggered Protocol (ETP) and Time-Triggered Protocol (TTP), which provide their own advantages of using them. Currently event-triggered protocol is used in vehicles, which means that in principle all activities are invoked by an event; most messages are transmitted periodically to the...

    Provided By IRD India

  • White Papers // Aug 2014

    Fuzzy Designing and Scheduling of Automotive ECUs Over Controller Area Network

    The technological advancements of embedded system and electronics within the vehicle are being driven by the challenge to make the vehicle safer, more energy efficient and networked. Implementation of Automotive tasks has become easier with various advancement in software and hardware design modules. These Automotive tasks are implemented on a...

    Provided By IRD India

  • White Papers // Aug 2014

    Parallel Processing Shared Memory with Snoopy Cache

    Implementation of parallel processing with snoopy cache is an idea to enhance the performance of computing in real-time. When the authors consider uniprocessor the execution will take sequential. In uniprocessor they may not face problems. When they come to multi-core processors in parallel processing the program is divided into slices...

    Provided By IRD India

  • White Papers // Aug 2014

    A Review of Factors and Data Mining Techniques for Employee Attrition and Retention in Industries

    In an exceedingly data driven economy, it's obvious that that raising as key competitive differentiators and retaining the talent pool has become a matter of dominant importance. This paper is to provide a background on attrition and also to enlist various factors that build staff displease. This paper also provides...

    Provided By IRD India

  • White Papers // Aug 2014

    Low Power and Area Efficient Folded Architecture for Row Bypassing Multiplier Using FPGA

    Optimizing power consumption and reducing hardware complexity are the most important criteria for the fabrication of DSP architectures. DSP operation must be completed within fixed time which demands the usage of high speed multiplier that consumes low power. In this work, a methodology to determine the best solution to this...

    Provided By IRD India

  • White Papers // Aug 2014

    Mobility Based Key Management Scheme of Wireless Sensor Network

    In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink...

    Provided By IRD India

  • White Papers // Aug 2014

    Cybercrime Analysis and Data Mining Methodologies

    Crime is identified as an act which is punishable by legislation in accordance with Thakur. However, an act that is considered as a crime in one place and time may not be true in another place or time. In this paper, the authors presented about the crime data mining a...

    Provided By IRD India

  • White Papers // Aug 2014

    Mobility Based Key Management Scheme of Wireless Sensor Network

    In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink...

    Provided By IRD India

  • White Papers // Aug 2014

    Cybercrime Analysis and Data Mining Methodologies

    Crime is identified as an act which is punishable by legislation in accordance with Thakur. However, an act that is considered as a crime in one place and time may not be true in another place or time. In this paper, the authors presented about the crime data mining a...

    Provided By IRD India

  • White Papers // Aug 2014

    Enhanced File Security Using Encryption and Splitting Technique Over Multi-Cloud Environment

    Cloud computing is a fastest growing technology. It allows business organizations to use or access different applications, store information without access their personal files. While considering the power, stability and the security of cloud one can't ignore different threats to user's data on cloud storage. File access assure in real...

    Provided By IRD India

  • White Papers // Aug 2014

    A Novel Symmetric Key Cryptography Based on Doubly Even Order Magic Square

    Now-a-days with the global acceptance of the Internet, the people communication becomes faster and easier. Every computer is connected virtually to every other through internet. Therefore, cryptography becomes a crucial aspect for secure communication to protect important data from eavesdroppers. In this paper, a session based bit level symmetric key...

    Provided By IRD India

  • White Papers // Aug 2014

    LAN Based Secured Active Data Dissemination in Mobile Social Networks

    In Mobile Social Networks (MSNets), data dissemination is very important, which has not been widely investigated yet. Active data dissemination is a networking paradigm where a superuser intentionally facilitates the connectivity in the network. One of the key challenges is how to design the most efficient superuser route to achieve...

    Provided By IRD India

  • White Papers // Mar 2014

    Reduced Transmission of Application Information Security on Android with Synchronization

    In present days, mobile phones which use android operating system is equipped with richer applications than mobile phones with traditional operating system. These makes user to store most of the information on mobile phones. The mobile phones with android operating system need to be upgrades with latest version of its...

    Provided By IRD India

  • White Papers // Mar 2014

    IEEE 802.11ac: Enhancing Throughput and MAC Layer Performance With Rate Adaptation Algorithm

    The IEEE 802.11ac is an emerging Very High Throughput (VHT) WLAN standard, targeted to achieve data rates close to 6.9 Gbps for 5GHz spectrum band. The paper presents the throughput analysis of 802.11ac MAC layer with help of rate adaptation algorithm to show efficacy of 802.11ac over 802.11n WLAN standard...

    Provided By IRD India

  • White Papers // Apr 2014

    Denial of Service Attacks in Wireless Sensor Networks

    Network survivability is the capacity of a network keeping connected under loss and intrusions, which is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses about...

    Provided By IRD India

  • White Papers // Jul 2014

    FPGA Implementation of Data Encryption and Decryption Using Optimized LED Algorithm

    In this paper, the authors present Light weight Encryption Device (LED) on Field Programmable Gate Array (FPGA). An optimized code for the light weight encryption algorithm with 128 bits key size and 64 bits block size has been developed. They have designed iterative architecture for speed improvements and hardware elements...

    Provided By IRD India

  • White Papers // Jul 2014

    Comparative Study of Data Mining Clustering Algorithms

    Clustering is the process of grouping physical or abstract objects into classes of similar objects. These groups of similar objects are called clusters. Objects in one cluster are very similar to other objects in that particular cluster but very dissimilar when compared to objects in other clusters. Portraying data by...

    Provided By IRD India

  • White Papers // Jul 2014

    A Distributed Channel Assignment Algorithm for Uncoordinated WLANs

    Campus and enterprise wireless networks are increasingly characterized by ubiquitous coverage and rising traffic demands. Efficiently assigning channels to Access Points (APs) in these networks can significantly affect the performance and capacity of the WLANs. In this paper, communication efficiency can be improved significantly by using a distributed channel assignment...

    Provided By IRD India

  • White Papers // Jul 2014

    Examining Search-Based Algorithms in Software Testing

    Software testing is a way of improving software quality. It is an essential and an expensive phase of Software Development Life Cycle (SDLC). There has been an ongoing research in this field to automate the process of software testing so that expenses can be reduced. But size and complexity of...

    Provided By IRD India

  • White Papers // Feb 2014

    Artificial Immune System for Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems are designed to remove this vulnerability. The authors' system uses the concepts of Artificial Intelligence (AI) and Human Immune System (HIS) to detect misbehavior in routing protocol. In their system...

    Provided By IRD India

  • White Papers // Feb 2014

    Survey of Detection of Malicious Nodes in Peer to Peer

    Peer-To-Peer (P2P) streaming has witnessed a great success, thanks to the possibility of aggregating resources from all participants. However, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus data on purpose. In a Peer-To-Peer (P2P) streaming system, since each peer...

    Provided By IRD India

  • White Papers // Feb 2014

    A Survey on Data Dissemination to Mobile Sink Groups in Wireless Sensor Networks

    In past few years, the domain of data dissemination in wireless sensor networks has been the area of interest to be researched. Whenever there is context of mobile sink groups, the data delivery relates to a complex mechanism because mobile groups have a feature to move in a collective manner....

    Provided By IRD India

  • White Papers // Feb 2014

    Instance Level Constraint Based User Clustering

    Clustering with constraints is fairly recent trend of development which allows a domain expert's interference in the clustering process. The authors use modified objective function of k-means algorithm to incorporate constraints to cluster twitter users. In this paper, they generate instance level constraints using normalized cosine measure, do basic filtering...

    Provided By IRD India

  • White Papers // Feb 2014

    Address Allocation in Manet - A Literature Survey

    A mobile ad hoc network is a network with nodes which are self-configuring and that route the messages themselves. Hence, there is no need for additional infrastructure to build the network. However, lack of infrastructure makes the address allocation in the ad hoc network difficult. There are events like partitioning,...

    Provided By IRD India

  • White Papers // Feb 2014

    Two Factor Framework for Web Based Social Network Based on PKI

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. and it must protected by assigning a password to gain unauthorized access to that data, because the privacy, integrity and confidentiality are the most important...

    Provided By IRD India

  • White Papers // Feb 2014

    An Efficient Provision of Selfadaptive Multi Media Streaming Service for Android Phones

    Mobile devices now-a-days are widespread and provide great multimedia capabilities, which provide the efficient delivery of live video streaming. Multimedia information can be obtained easily using mobile devices, allowing users to enjoy ubiquitous network services. Cloud multimedia streaming have disruptively occupied bandwidth in wireless network, which poses many challenges in...

    Provided By IRD India

  • White Papers // Feb 2014

    Big Data Intelligence on Logistics

    The logistics industry is competing in a changing and continuously challenging world. As the people economy is moving into this new information age, logistics industries are facing a lot of challenges as well as opportunities. The advancement of e-commerce and evolution of new data sources like sensors; GPS, Smartphone's etc...

    Provided By IRD India

  • White Papers // Feb 2014

    Data Extraction From Wireless Sensor Network with Cloud Computing

    WSN have several applications in different domains. WSN enables the information gathering across the spectrum of Endeavour including environmental monitoring, home automation, tracking, health care, business etc. But the gathered information is not used adequately because of the lack of expertise and storage for further use. To overcome this problem...

    Provided By IRD India

  • White Papers // Aug 2014

    Distance Based Node Election for Energy Efficient Routing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a form of ad hoc network consisting of tens to thousands of distributed autonomous tiny computing devices each equipped with sensors, a wireless radio, a processor, and a power source. Because of military applications such as battlefield surveillance the wireless sensor networks are originally...

    Provided By IRD India

  • White Papers // Jun 2014

    Comparative Study of Duty Cycle and Network Coding Based Analysis of Lifetime for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of autonomous sensor nodes which are equipped with limited battery and requires energy management for enhanced Network Lifetime. The area around the sink forms a bottleneck zone due to heavy traffic-flow will be in demand of more power which limits the network lifetime. This paper...

    Provided By IRD India

  • White Papers // Oct 2013

    Secure Banking Application Using Visual Cryptography Against Fake Website Authenticity Theft

    Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of...

    Provided By IRD India

  • White Papers // Oct 2013

    Reducing Access Delay in Machine to Machine Wireless Communication Over LTE

    Machine type communication is the new buzz in 4th generation mobile technology. Trillions of machines are deployed under one base station and they try to access the network in random fashion. Handling so many devices is a big problem and it needs proper solution to avoid overloading of the network....

    Provided By IRD India

  • White Papers // Oct 2013

    Comparison of Initial and Continuous Neighbor Discovery in Asynchronous Sensor Networks

    In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchronization between neighboring nodes. Hence, even after a sensor is aware of its immediate neighbors, it must continuously maintain its view, a process...

    Provided By IRD India

  • White Papers // Aug 2013

    Delay Performance of Multi-Hop Wireless Sensor Networks with Mobile Sinks

    A mobile Wireless Sensor Networks (WSN) owes its name to the presence of mobile sinks or sensor nodes within the network. This paper has transmission of packets from source to the destination sink by reducing delay and improving network lifetime constraints. End-to-end delay analysis can be used in wireless sensor...

    Provided By IRD India

  • White Papers // Sep 2013

    A Survey on Large Scale Overlay for Query Processing in P2P Network

    The scalability of a feedback aggregating overlay is the most fundamental requirement for large-scale P2P computing. In Peer-To-Peer (P2P) trust management feedback provides an efficient and effective way to build a reputation-based trust relationship among peers. In this paper, the authors proposed a Scalable Feedback Aggregating (SFA) overlay for large-scale...

    Provided By IRD India

  • White Papers // Aug 2014

    Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic Applications in MANETs

    Security in Mobile Ad hoc NETworks (MANETs) is a critical issue. MANETs are vulnerable to different types of attacks. Many of the routing attacks have been identified at network layer such as black hole, worm hole, gray hole and byzantine attacks. Out of all these attacks, black hole is the...

    Provided By IRD India

  • White Papers // Jul 2014

    Bandwidth Efficient Remote Video Surveillance System

    In this paper, the authors present an experimental work on video surveillance system which is capable of monitoring a desired room for security purpose. The system will continuously keep track of particular location with help of camera installed and obtain database of image frames from video. Adjacent frames are compared...

    Provided By IRD India

  • White Papers // Jul 2014

    Threshold Based Intrusion Detection System for MANET Using Machine Learning Approach

    Ad hoc nature of Mobile Ad hoc NETwork makes MANET most promising communication model in rescue and military areas. Its dynamicity property and infrastructure less deployment invites attacker (insider or outsider) to disrupt the MANET. Hosts itself as a router makes cooperation better but finding the route has inherent weakness...

    Provided By IRD India

  • White Papers // Apr 2014

    A Survey on Energy Conservation Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have been a growing domain of research for the past few decades. The tasks performed by this network is basically sensing of required data as per the application by the deployed sensor nodes, collecting and processing the required data and forwarding the data of interest to...

    Provided By IRD India

  • White Papers // Aug 2013

    Probabilistic Approach Towards Sustaining Higher Performance Indicators in WSN

    Wireless sensor networks are a class of distributed systems that sense their data from the surroundings in real time. Compared with the traditional wireless networks, wireless sensor networks have energy constraints, low-data-rate of high redundant and data flow of high-to-one, and so on. Energy effectiveness is the key performance indicators...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Evaluation of Node Disjoint Multipath Routing Protocol Based on AODV for MANETs

    Mobile Ad-hoc NETworks (MANETs) is a collection of mobile nodes that can communicate with each other using multi-hop wireless links without utilizing any fixed base station infrastructure and centralized management. MANETs are typically characterized by dynamic topology, high node mobility, low channel bandwidth, limited battery power and frequent link failures,...

    Provided By IRD India

  • White Papers // Apr 2014

    Spam E-Mail Detection by Random Forests Algorithm

    Spam officially called unsolicited bulk email or unsolicited commercial email, which is rapidly becoming a major problem on the Internet. It is an attempt to deliver a message, over the Internet, to someone who would not otherwise to receive it. These junk emails may contain various types of message such...

    Provided By IRD India

  • White Papers // Apr 2014

    Privacy and Integrity Preserving on Range Queries in Sensor Networks

    In two tiered architecture of sensor networks, the storage node serves as an intermediate tier between the sensor and the sink during storing data and processing queries. This model is widely adopted due to its processing efficiency and power saving and storing benefits. However, the storage node becomes attractive for...

    Provided By IRD India

  • White Papers // Apr 2014

    Survey on Various Congestion Detection and Control Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSN's) are expected to have wide range of applications and increasing deployment in the near future as it provides a low cost solution with respect to both maintenance and installation. WSN's are distributed self-governing sensors used to monitor the physical conditions of the environment. They are constructed...

    Provided By IRD India

  • White Papers // Apr 2014

    DSA - A Reliable Intrusion-Detection System for MANETs

    MANET (Mobile Ad hoc NETwork) meant to be work under the Infrastructure less medium; it suffers from the limited bandwidth, dynamic topology problems etc. There is no base station or central control for the network and all nodes work autonomously. These characteristics are highly favorable for malicious user to entering...

    Provided By IRD India

  • White Papers // Aug 2014

    Efficient Hierarchical Based Routing Protocol Enhancement for Energy Balancing and Prolonging the Lifetime of the WSNs

    Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous tiny computing devices, each equipped with sensors, a wireless radio, a processor, and a power source. Sensor networks are envisioned to be deployed in the physical environment in order to monitor a wide range of environmental phenomena....

    Provided By IRD India

  • White Papers // Aug 2013

    QualNet Simulation of VANET Scenario for TLE (Traffic Light Environment) Performance Evaluation

    Vehicular Ad-hoc NETworks (VANETs) are attracting considerable attention from the research community and the automotive industry to improve the services of Intelligent Transportation System (ITS). As today's transportation system faces serious challenges in terms of road safety, efficiency, and environmental friendliness, the idea of so called \"ITS\" has emerged. Due...

    Provided By IRD India