IRD India

Displaying 1-40 of 101 results

  • White Papers // Aug 2014

    Mobility Based Key Management Scheme of Wireless Sensor Network

    In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink...

    Provided By IRD India

  • White Papers // Aug 2014

    Cybercrime Analysis and Data Mining Methodologies

    Crime is identified as an act which is punishable by legislation in accordance with Thakur. However, an act that is considered as a crime in one place and time may not be true in another place or time. In this paper, the authors presented about the crime data mining a...

    Provided By IRD India

  • White Papers // Aug 2014

    A Novel Symmetric Key Cryptography Based on Doubly Even Order Magic Square

    Now-a-days with the global acceptance of the Internet, the people communication becomes faster and easier. Every computer is connected virtually to every other through internet. Therefore, cryptography becomes a crucial aspect for secure communication to protect important data from eavesdroppers. In this paper, a session based bit level symmetric key...

    Provided By IRD India

  • White Papers // Aug 2014

    Enhanced File Security Using Encryption and Splitting Technique Over Multi-Cloud Environment

    Cloud computing is a fastest growing technology. It allows business organizations to use or access different applications, store information without access their personal files. While considering the power, stability and the security of cloud one can't ignore different threats to user's data on cloud storage. File access assure in real...

    Provided By IRD India

  • White Papers // Aug 2014

    Efficient Hierarchical Based Routing Protocol Enhancement for Energy Balancing and Prolonging the Lifetime of the WSNs

    Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous tiny computing devices, each equipped with sensors, a wireless radio, a processor, and a power source. Sensor networks are envisioned to be deployed in the physical environment in order to monitor a wide range of environmental phenomena....

    Provided By IRD India

  • White Papers // Aug 2014

    Distance Based Node Election for Energy Efficient Routing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a form of ad hoc network consisting of tens to thousands of distributed autonomous tiny computing devices each equipped with sensors, a wireless radio, a processor, and a power source. Because of military applications such as battlefield surveillance the wireless sensor networks are originally...

    Provided By IRD India

  • White Papers // Aug 2014

    Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic Applications in MANETs

    Security in Mobile Ad hoc NETworks (MANETs) is a critical issue. MANETs are vulnerable to different types of attacks. Many of the routing attacks have been identified at network layer such as black hole, worm hole, gray hole and byzantine attacks. Out of all these attacks, black hole is the...

    Provided By IRD India

  • White Papers // Aug 2014

    LAN Based Secured Active Data Dissemination in Mobile Social Networks

    In Mobile Social Networks (MSNets), data dissemination is very important, which has not been widely investigated yet. Active data dissemination is a networking paradigm where a superuser intentionally facilitates the connectivity in the network. One of the key challenges is how to design the most efficient superuser route to achieve...

    Provided By IRD India

  • White Papers // Jul 2014

    Threshold Based Intrusion Detection System for MANET Using Machine Learning Approach

    Ad hoc nature of Mobile Ad hoc NETwork makes MANET most promising communication model in rescue and military areas. Its dynamicity property and infrastructure less deployment invites attacker (insider or outsider) to disrupt the MANET. Hosts itself as a router makes cooperation better but finding the route has inherent weakness...

    Provided By IRD India

  • White Papers // Jul 2014

    Bandwidth Efficient Remote Video Surveillance System

    In this paper, the authors present an experimental work on video surveillance system which is capable of monitoring a desired room for security purpose. The system will continuously keep track of particular location with help of camera installed and obtain database of image frames from video. Adjacent frames are compared...

    Provided By IRD India

  • White Papers // Jul 2014

    A Distributed Channel Assignment Algorithm for Uncoordinated WLANs

    Campus and enterprise wireless networks are increasingly characterized by ubiquitous coverage and rising traffic demands. Efficiently assigning channels to Access Points (APs) in these networks can significantly affect the performance and capacity of the WLANs. In this paper, communication efficiency can be improved significantly by using a distributed channel assignment...

    Provided By IRD India

  • White Papers // Jul 2014

    Examining Search-Based Algorithms in Software Testing

    Software testing is a way of improving software quality. It is an essential and an expensive phase of Software Development Life Cycle (SDLC). There has been an ongoing research in this field to automate the process of software testing so that expenses can be reduced. But size and complexity of...

    Provided By IRD India

  • White Papers // Jul 2014

    FPGA Implementation of Data Encryption and Decryption Using Optimized LED Algorithm

    In this paper, the authors present Light weight Encryption Device (LED) on Field Programmable Gate Array (FPGA). An optimized code for the light weight encryption algorithm with 128 bits key size and 64 bits block size has been developed. They have designed iterative architecture for speed improvements and hardware elements...

    Provided By IRD India

  • White Papers // Jul 2014

    Comparative Study of Data Mining Clustering Algorithms

    Clustering is the process of grouping physical or abstract objects into classes of similar objects. These groups of similar objects are called clusters. Objects in one cluster are very similar to other objects in that particular cluster but very dissimilar when compared to objects in other clusters. Portraying data by...

    Provided By IRD India

  • White Papers // Jun 2014

    Comparative Study of Duty Cycle and Network Coding Based Analysis of Lifetime for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of autonomous sensor nodes which are equipped with limited battery and requires energy management for enhanced Network Lifetime. The area around the sink forms a bottleneck zone due to heavy traffic-flow will be in demand of more power which limits the network lifetime. This paper...

    Provided By IRD India

  • White Papers // Apr 2014

    Denial of Service Attacks in Wireless Sensor Networks

    Network survivability is the capacity of a network keeping connected under loss and intrusions, which is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses about...

    Provided By IRD India

  • White Papers // Apr 2014

    Survey on Various Congestion Detection and Control Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSN's) are expected to have wide range of applications and increasing deployment in the near future as it provides a low cost solution with respect to both maintenance and installation. WSN's are distributed self-governing sensors used to monitor the physical conditions of the environment. They are constructed...

    Provided By IRD India

  • White Papers // Apr 2014

    DSA - A Reliable Intrusion-Detection System for MANETs

    MANET (Mobile Ad hoc NETwork) meant to be work under the Infrastructure less medium; it suffers from the limited bandwidth, dynamic topology problems etc. There is no base station or central control for the network and all nodes work autonomously. These characteristics are highly favorable for malicious user to entering...

    Provided By IRD India

  • White Papers // Apr 2014

    Privacy and Integrity Preserving on Range Queries in Sensor Networks

    In two tiered architecture of sensor networks, the storage node serves as an intermediate tier between the sensor and the sink during storing data and processing queries. This model is widely adopted due to its processing efficiency and power saving and storing benefits. However, the storage node becomes attractive for...

    Provided By IRD India

  • White Papers // Apr 2014

    A Survey on Energy Conservation Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have been a growing domain of research for the past few decades. The tasks performed by this network is basically sensing of required data as per the application by the deployed sensor nodes, collecting and processing the required data and forwarding the data of interest to...

    Provided By IRD India

  • White Papers // Apr 2014

    Spam E-Mail Detection by Random Forests Algorithm

    Spam officially called unsolicited bulk email or unsolicited commercial email, which is rapidly becoming a major problem on the Internet. It is an attempt to deliver a message, over the Internet, to someone who would not otherwise to receive it. These junk emails may contain various types of message such...

    Provided By IRD India

  • White Papers // Mar 2014

    Reduced Transmission of Application Information Security on Android with Synchronization

    In present days, mobile phones which use android operating system is equipped with richer applications than mobile phones with traditional operating system. These makes user to store most of the information on mobile phones. The mobile phones with android operating system need to be upgrades with latest version of its...

    Provided By IRD India

  • White Papers // Mar 2014

    IEEE 802.11ac: Enhancing Throughput and MAC Layer Performance With Rate Adaptation Algorithm

    The IEEE 802.11ac is an emerging Very High Throughput (VHT) WLAN standard, targeted to achieve data rates close to 6.9 Gbps for 5GHz spectrum band. The paper presents the throughput analysis of 802.11ac MAC layer with help of rate adaptation algorithm to show efficacy of 802.11ac over 802.11n WLAN standard...

    Provided By IRD India

  • White Papers // Feb 2014

    Two Factor Framework for Web Based Social Network Based on PKI

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. and it must protected by assigning a password to gain unauthorized access to that data, because the privacy, integrity and confidentiality are the most important...

    Provided By IRD India

  • White Papers // Feb 2014

    Address Allocation in Manet - A Literature Survey

    A mobile ad hoc network is a network with nodes which are self-configuring and that route the messages themselves. Hence, there is no need for additional infrastructure to build the network. However, lack of infrastructure makes the address allocation in the ad hoc network difficult. There are events like partitioning,...

    Provided By IRD India

  • White Papers // Feb 2014

    Big Data Intelligence on Logistics

    The logistics industry is competing in a changing and continuously challenging world. As the people economy is moving into this new information age, logistics industries are facing a lot of challenges as well as opportunities. The advancement of e-commerce and evolution of new data sources like sensors; GPS, Smartphone's etc...

    Provided By IRD India

  • White Papers // Feb 2014

    An Efficient Provision of Selfadaptive Multi Media Streaming Service for Android Phones

    Mobile devices now-a-days are widespread and provide great multimedia capabilities, which provide the efficient delivery of live video streaming. Multimedia information can be obtained easily using mobile devices, allowing users to enjoy ubiquitous network services. Cloud multimedia streaming have disruptively occupied bandwidth in wireless network, which poses many challenges in...

    Provided By IRD India

  • White Papers // Feb 2014

    Data Extraction From Wireless Sensor Network with Cloud Computing

    WSN have several applications in different domains. WSN enables the information gathering across the spectrum of Endeavour including environmental monitoring, home automation, tracking, health care, business etc. But the gathered information is not used adequately because of the lack of expertise and storage for further use. To overcome this problem...

    Provided By IRD India

  • White Papers // Feb 2014

    Instance Level Constraint Based User Clustering

    Clustering with constraints is fairly recent trend of development which allows a domain expert's interference in the clustering process. The authors use modified objective function of k-means algorithm to incorporate constraints to cluster twitter users. In this paper, they generate instance level constraints using normalized cosine measure, do basic filtering...

    Provided By IRD India

  • White Papers // Feb 2014

    A Survey on Data Dissemination to Mobile Sink Groups in Wireless Sensor Networks

    In past few years, the domain of data dissemination in wireless sensor networks has been the area of interest to be researched. Whenever there is context of mobile sink groups, the data delivery relates to a complex mechanism because mobile groups have a feature to move in a collective manner....

    Provided By IRD India

  • White Papers // Feb 2014

    Survey of Detection of Malicious Nodes in Peer to Peer

    Peer-To-Peer (P2P) streaming has witnessed a great success, thanks to the possibility of aggregating resources from all participants. However, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus data on purpose. In a Peer-To-Peer (P2P) streaming system, since each peer...

    Provided By IRD India

  • White Papers // Feb 2014

    Artificial Immune System for Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems are designed to remove this vulnerability. The authors' system uses the concepts of Artificial Intelligence (AI) and Human Immune System (HIS) to detect misbehavior in routing protocol. In their system...

    Provided By IRD India

  • White Papers // Nov 2013

    The Survey on Security for Smart Dust

    Smart dust motes, as networked computing devices continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due...

    Provided By IRD India

  • White Papers // Nov 2013

    A Walk Through Clouds with Cloud Provisioning and Management

    In this paper, the authors describe \"Cloud computing\", a computing platform for the next generation of the Internet. In this paper, they define clouds, explain the business benefits of cloud computing, and outline the cloud architecture and its major components. The user will discover how a business can use cloud...

    Provided By IRD India

  • White Papers // Nov 2013

    Mitigating Cloud Virtualization Vulnerabilities

    The main idea of cloud computing is to build a virtualized computing resource pool by centralizing abundant computing resources connected with network and present the service of infrastructure, platform and software. Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its infinite benefits. However,...

    Provided By IRD India

  • White Papers // Oct 2013

    A Review of Cloud Computing and Security Issues at Different Levels in Cloud Computing

    Cloud computing is one of exciting technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for computer processes. Cloud computing can be viewed as different things to different people and its elastic nature makes it suitable to any organization. Cloud computing can do...

    Provided By IRD India

  • White Papers // Oct 2013

    Quantum Cryptography with Key Distribution in Wireless Network

    It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security....

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of Multi-Threaded Pipelined Aes Crypto Processor

    In this paper, the authors present AES algorithm implementation using multi-threaded and pipelining concept for faster data encryption and its physical implementation using 40nm technology. AES crypto-algorithm is widely used in secured wireless communications, zigbee, Electronic financial transactions, content protection, digital rights, set-top boxes etc. The AES algorithm is symmetric...

    Provided By IRD India

  • White Papers // Oct 2013

    ASIC Implementation of 128 Bit Key Rc5 Cipher

    In this paper, the authors present the design of RC5 algorithm and its physical design implementation. The RC5 cryptographic algorithm is widely used in wireless communication networks like WSAN and WBSN. RC5 is a fast block cipher, developed by RSA security, which exploits data rotation to achieve a high level...

    Provided By IRD India

  • White Papers // Oct 2013

    Comparison of Initial and Continuous Neighbor Discovery in Asynchronous Sensor Networks

    In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchronization between neighboring nodes. Hence, even after a sensor is aware of its immediate neighbors, it must continuously maintain its view, a process...

    Provided By IRD India

  • White Papers // Jul 2012

    Traffic Management Through Inter-Communication Between Cars Using VANET System

    Vehicular Ad-hoc NETwork (VANET) basically used to provide various services to its user. Misbehaviour of such system should be defended. VANET system provides the intercommunication between the vehicles by letting them exchange the traffic information. Such kind of exchanges may create privacy apprehension since the vehicle-generated information can contain much...

    Provided By IRD India

  • White Papers // Jul 2012

    Null Direction Propagation of Antennas and Counter Measures in Tactical High Frequency Sky Wave Communication

    In tactical High Frequency (HF) communication, sky wave and ground wave mode establish the radio link. There is a phenomenon by which antenna in ground wave mode communicates with antenna in sky wave mode. This happens due to emission of radio waves in the NULL direction. This emission can be...

    Provided By IRD India

  • White Papers // Jul 2012

    High Throughput Lossless Data Compression Algorithm

    Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Data compression offers an attractive approach to reducing communication costs by using available bandwidth effectively. Though this scheme has clear benefits, the execution time of compression and decompression is critical to its application in...

    Provided By IRD India

  • White Papers // Jul 2012

    Achieving Privacy Preservation Schemas Against Traffic Analysis in Multi-Hop Wireless Networks

    Privacy threat is one of the critical issues in multihop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to thwart these attacks since the coding/mixing operation is encouraged...

    Provided By IRD India

  • White Papers // Jul 2012

    Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System

    Data storage and transmission, task scheduling, and network construction used for that. The authors have proposed a clustering algorithm to find the group relationships for query and data aggregation efficiency. This paper are as follows: First, since the clustering algorithm itself is a centralized algorithm, in this paper, they further...

    Provided By IRD India

  • White Papers // Oct 2012

    BgpAND - Architecting a Modular BGP4 Attack & Anomalies Detection Platform

    Border Gateway Protocol (BGP) is an Autonomous System (AS) routing protocol. It forms the backbone of Internet core routing decisions. However, it is also equally prone to security issues and several attempts to attack & exploit the protocol have been noted. bgpAND is a platform designed and developed to analyze...

    Provided By IRD India

  • White Papers // Oct 2012

    Safer Data Transmission Using Steganography

    Today's Internet connected networks are under permanent attack by intruders and hackers. The explosive growth of computer systems and their interconnections has led to a heightened awareness of the need to protect the data transmitted. There are many ways already existing and also discovered daily. The field of cryptography has...

    Provided By IRD India

  • White Papers // Oct 2012

    A Scheme for Key Revocation in Wireless Sensor Networks

    Key revocation is a challenging task in wireless sensor networks. There can be many nodes in a sensor network sharing the same key(s) in their key ring. If any of those nodes in the network gets compromised then the keys of those nodes having same keys will also be revealed....

    Provided By IRD India

  • White Papers // Nov 2012

    Parallel Data Mining and Assurance Service Model Using Hadoop in Cloud

    In the information industry, huge amount of data is widely available and there is an imminent need for turning such data into useful information. This need is fulfilled by the process of exploration and analysis, by automatic or semi-automatic means, of large quantities of data provided by Data Mining. In...

    Provided By IRD India

  • White Papers // Dec 2012

    Multiple Trust in Trust-Based On-Demand Routing in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworking is concept of communication, which means a communication temporary network without any form of centralized administration. Every node in this network acts both as host and a router to forward packets for other node. Due to the absence of the centralized administration, MANETs are easily attacked by...

    Provided By IRD India

  • White Papers // Dec 2012

    A High Speed Frequency Based Multimodal Biometric System Using Iris and Fingerprint

    In this paper, the authors adopt a unified viewpoint to extract singular points (core and delta) that determine the topological structure and largely influence the orientation field by using the principal of Gabor basis functions. Lastly the points are classified into classes by method of Poincare index for Fingerprint classification....

    Provided By IRD India

  • White Papers // Dec 2012

    Border Gateway Protocol - A Best Performance Protocol When Used for External Routing Than Internal Routing

    The paper addresses the interoperability issues between Internal Border Gateway Protocol (IBGP) over other Interior Gateway Protocols (IGPs) by knowing the characteristics of the respective protocols and also studies the efficiency of External Border Gateway Protocol (EBGP) as an Exterior Gateway Protocol (EGP). Furthermore, it shows how IGRP proves to...

    Provided By IRD India

  • White Papers // Jun 2013

    Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks

    Using multiple channels over single channel the performance can be significantly increased since the use of multiple channels can reduce interference influence. Channel assignment is one of the most basic and major concern in such networks. By effectively utilizing multiple non overlapping channels and multiple interfaces, collision and co-channel interference...

    Provided By IRD India

  • White Papers // Jun 2013

    3 Dimensional Security in Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. So it is emerging field...

    Provided By IRD India

  • White Papers // Jun 2013

    To Implement SaaS Multitenant Framework Security in Cloud Computing

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By IRD India

  • White Papers // Apr 2013

    Enriching Mobile Multimedia Applications Using Cloud Mobile Media

    Cloud Mobile Gaming (CMG), an approach that enables rich multiplayer Internet games on mobile devices, where compute intensive tasks like graphic rendering are executed on cloud servers in response to gaming commands on a mobile device, and the resulting video has to be streamed back to the mobile device in...

    Provided By IRD India

  • White Papers // Apr 2013

    Articulate Features for Mobile-Social TV System Using Cloud Computing

    The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services. In this paper, Articulate Features for Mobile-Social TV System using Cloud Computing (CloudMoV) is proposed. This system effectively utilizes...

    Provided By IRD India

  • White Papers // May 2013

    Analytical Survey Model on Consumption of Cloud Service Models

    A new paradigm of computing is evolved that is cloud computing where word cloud is used as an allegory for the internet. The incarnation of this technology forces the organizations to rapidly shifting their IT systems from traditional client/server to cloud computing model where everything is offered as a service...

    Provided By IRD India

  • White Papers // Jun 2013

    Three-Dimensional Password Generation Technique for Accessing Cloud Services

    Cloud computing refers to the use and access of multiple server-based computational re-sources via a digital network (WAN, Internet connection using the World Wide Web, etc.). To utilize these services by intended customer, it is necessary to have strong password authentication. At present, cloud password authentication can be done in...

    Provided By IRD India

  • White Papers // Nov 2012

    Selective Encryption Algorithm for Wireless Ad-hoc Networks

    Security is one of the most challenging aspects in the internet and network applications. Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a wireless ad hoc network with constraint computational resources, the cryptosystem based on symmetric key algorithms is...

    Provided By IRD India

  • White Papers // Nov 2013

    The Survey on Security for Smart Dust

    Smart dust motes, as networked computing devices continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. However, due...

    Provided By IRD India

  • White Papers // Oct 2013

    A Review of Cloud Computing and Security Issues at Different Levels in Cloud Computing

    Cloud computing is one of exciting technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for computer processes. Cloud computing can be viewed as different things to different people and its elastic nature makes it suitable to any organization. Cloud computing can do...

    Provided By IRD India

  • White Papers // Aug 2013

    Envisaging Roles for Access Security

    Access Control is the principle process of enterprise risk and Security Management. Role Based Access Control (RBAC) is the model for effective management of risk arises in safeguarding three important features of security Secrecy, Integrity and no Denial of Service (DoS). This paper addresses the new approach called \"Role visualization\"...

    Provided By IRD India

  • White Papers // Apr 2013

    Credit Card Endorsement using Biometrics in Cloud Computing

    This application focused on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transaction but there is no security measures to verify whether the user is authenticated or...

    Provided By IRD India

  • White Papers // Apr 2013

    A Ranking Based Approach in Security Alert for Handling Sensitive Data Organization

    An organization undoubtedly wants to preserve and retain data stored in an organization's computers. On the other hand, this data is necessary for daily work processes. Users within the organization's perimeter (e.g., employees, subcontractors, or partners) perform various actions on this data (e.g., query, report, and search) and may be...

    Provided By IRD India

  • White Papers // Apr 2013

    Detection and Prevention of Web Application Security Attacks

    Today's Web applications can contain dangerous security flaws. The global distribution of these applications makes them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. Research reports indicate that more than 80 percent of the web applications are vulnerable to security threats. User friendly web applications...

    Provided By IRD India

  • White Papers // Jun 2013

    Resource Allocation Model for Efficient Management in Cloud Computing

    Cloud computing is a computing technology where a large pool of computers are connected in private or public network which provides dynamically scalable infrastructure for application hosting, storage and delivery and it must be supported with minimal management effort or service provider interaction. A cloud environment consists of multiple customers...

    Provided By IRD India

  • White Papers // Dec 2012

    Distributed Systems and Economics Related to Pricing in Cloud Computing

    Cloud computing allows users to perform computation in a public cloud with a pricing scheme typically based on incurred resource consumption. While cloud computing is often considered as merely a new application for classic distributed systems, the authors argue that, by decoupling users from cloud providers with a pricing scheme...

    Provided By IRD India

  • White Papers // Apr 2013

    Data Mining Classification Through Simulation Technique

    The past two decades has seen a dramatic increase in the amount of information or data being stored in electronic format. This accumulation of data has taken place at an explosive rate. It has been estimated that the amount of information in the world doubles every 20 months and the...

    Provided By IRD India

  • White Papers // Oct 2013

    Multi-Agent Distributed Intrusion Detection System Using Ontology

    Web services are being used day-by-day. But many users are unaware of the vulnerabilities possible due to semantic web. Semantic web is a standard that promotes common data formats on the WWW. The various attacks are single or distributed which are at times not detectable by firewalls. Hence, there is...

    Provided By IRD India

  • White Papers // Dec 2012

    Mobile Commerce - New Way to Business

    The world wide web is now a practical medium for customers, information seekers, business owners and entrepreneurs. The increase in suppleness and power of internet provides proper opportunities for rising up services to customers. In today's scenario of business mobile commerce has entered in finance, services, retails, and telecommunication and...

    Provided By IRD India

  • White Papers // Aug 2013

    Tracking of Non Cooperative Target to Prevent the Gang Injection of False Data Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is a collection of heterogeneous sensor nodes having limited computation capacity, restricted memory space, limited power, and short range of communication which all are connected by wireless network. It is vulnerable to security attacks, attacks may be in the form of injection of false data, injection...

    Provided By IRD India

  • White Papers // Jun 2013

    A Secured Retrieval of Quantitative Data In An Outsourced Environment

    In this paper, the authors consider a secured proximity querying of quantitative data from an un-trusted server. The data is to be revealed only to trusted user and not to anyone else. The need for security may be due to the data being sensitive, valuable or otherwise confidential. Given this...

    Provided By IRD India

  • White Papers // Jul 2013

    Architectural Framework to Provide SaaS as Delivery Model

    Service Oriented Architecture (SOA) is a revolutionary paradigm for developers in order to gain on time and cost. Software-as-a-Service (SaaS) is a delivery model which gain in enormous economy in deployment, management. In this paper, the authors have proposed a model that re-defines the architecture of SOA in way to...

    Provided By IRD India

  • White Papers // Nov 2013

    A Walk Through Clouds with Cloud Provisioning and Management

    In this paper, the authors describe \"Cloud computing\", a computing platform for the next generation of the Internet. In this paper, they define clouds, explain the business benefits of cloud computing, and outline the cloud architecture and its major components. The user will discover how a business can use cloud...

    Provided By IRD India

  • White Papers // Aug 2013

    Obstruction of Undesired Traffic by Filtering Source Prefixes on the Internet

    In recent days, the Internet has seen a continuous rise in malicious traffic including DDoS attacks, worm attacks and spam. One way to deal with this problem is to filter unwanted traffic at the routers based on source IP addresses. Filtering techniques are available at routers today via Access Control...

    Provided By IRD India

  • White Papers // Jul 2013

    Dynamic Resourcing using Virtualization Technique in the Cloud and Implement Parallel Data Processing

    In recent years, ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Many cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their...

    Provided By IRD India

  • White Papers // Jul 2013

    Resource Monitoring and Provisioning in SaaS in Public Cloud

    Load balancing of non-preemptive independent tasks on Virtual Machines (VMs) is an important aspect of task scheduling in clouds. Whenever certain VMs are overloaded and remaining VMs are under loaded with tasks for processing, the load has to be balanced to achieve optimal machine utilization. In this paper, the authors...

    Provided By IRD India

  • White Papers // Jul 2013

    Wi-Fi Infrastructure Security System from Vulnerable Attacks

    Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

    Provided By IRD India

  • White Papers // Jun 2013

    Secured Modified Bloom's Based Q-Composite Key Distribution for Wireless Sensor Networks

    The security issue in a Wireless Sensor Network (WSN) has been drawing considerable research attention in recent years. However Key management, a basic security service, becomes the core design for various security services, such as encryption and authentication. To increase the connectivity of each key in a large-scale WSN and...

    Provided By IRD India