IRD India

Displaying 1-40 of 294 results

  • White Papers // May 2015

    Automatic Saline Level Monitoring System Using Microcontroller ATMEGA 328

    In this paper, the authors propose an automatic, low cost saline level measurement system using microcontroller ATMEGA 328.The main building blocks of the proposed system are microcontroller ATMEGA 328, Bluetooth module and IR sensors. The system contains two LEDs. The status of the saline can be given in two forms...

    Provided By IRD India

  • White Papers // May 2015

    Controller Area Network to Ethernet Conversion Using Raspberry Pi

    Controller Area Network (CAN) and Ethernet both use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as a media access control method. Beyond that, the CAN protocol is based on CSMA/ CD/AMP (Carrier-Sense Multiple Access/Collision Detection with Arbitration on Message Priority) protocol. Due to CSMA/CD in Ethernet as soon as...

    Provided By IRD India

  • White Papers // May 2015

    A Survey on Shortest Path Estimation Using RDBMS Over Graph

    Recently with the advancement of social networking sites vast amount of data emerges out, which is usually in the form of graph data. Many graph search queries are in use to access and retrieve this data. Shortest path computation is required in many applications for their faster execution and can...

    Provided By IRD India

  • White Papers // May 2015

    On Clouds the Authentication of Data Storage Using Decentralized Access Control by Unidentified Way

    The authors propose the secure data storage in clouds for a new decentralized access. The cloud verifies the authenticity of the series without knowing the user's identity in the proposed scheme. Their feature is that only valid users can able to decrypt the stored information. It prevents from the replay...

    Provided By IRD India

  • White Papers // May 2015

    On the Utilization Aspect of Document Data for Mining the Side Information

    In text mining applications, side-information is also available along with the text documents. This side-information can be like document provenance information, links existing inside the document, web logs based on user-access behavior, or non-textual attributes which exist in the text document. Such attributes will contain remarkable amount of information for...

    Provided By IRD India

  • White Papers // May 2015

    Design and Implementation of Spartan 6 Series FPGA Board and Application of PID Controller for Robots

    The Spartan-6 family of field-programmable gate arrays is one of the latest devices and specifically designed to meet the needs of high volume, cost-sensitive consumer electronic applications. The thirteen-member family offers densities ranging from 3,840 to 147,443 logic cells and system gates. The Spartan-6 family builds on the success of...

    Provided By IRD India

  • White Papers // May 2015

    A Novel Approach for Implementation of AES Algorithm on NOC

    Network-on-Chip (NoC) is the scalable platform where billion transistors have been integrated on to a single chip. NoC architecture is an mxn mesh of processing elements where resources are placed on the slots formed by the switches. Each switch is connected to one resource and four neighboring switches, and each...

    Provided By IRD India

  • White Papers // May 2015

    Analysis of Harmonics in Five Phase Inverter Drive with Double Tuned Filter Using Simulink/LATLAB

    The advancement in present technologies high speed electronics is generates unwanted harmonics in the line voltages and currents. Mitigation of harmonics is the present challenge and the best solution is to implement with the filters. This paper presents the design of double tuned filter to reduce the voltage/current harmonics produced...

    Provided By IRD India

  • White Papers // May 2015

    Fault Tolerant Linear State Machine Design Approach for Safety Critical Systems Implemented on FPGA

    In this paper, the authors propose a new method for the design of fault tolerant linear state machines with initial state 0 and one dimensional input and one-dimensional output. It is shown that the LFSR-implementation of the transfer function of a linear automaton can be utilized to correct transient errors...

    Provided By IRD India

  • White Papers // May 2015

    Sustainable HR: A Need for a Sustainable Enterprise

    In status quo the word "Sustainability" is a commonly used word. It's a challenge for everyone everywhere beginning from environment to economy. But, the modern competitive and globalized business world has expanded the meaning and the value of sustainability. This paper represents the role of human capital and its management...

    Provided By IRD India

  • White Papers // Apr 2015

    An Efficient String-Join Architecture Using Map-Reduce Approach

    The string relationship join, that happens to identify similar string-pairs from string-sets, gets comprehensive interest in DataBase (DB) and data retrieval programs. For this challenge, the refine and filter structure is typically implemented by the existent investigation work initially and then different streaming techniques have also been proposed. In the...

    Provided By IRD India

  • White Papers // Mar 2015

    Establishing Secure Mining of Item Set in a Databases that is Dispersed Horizontally

    The authors propose transaction databases where the user requirements changes accordingly. The association is for predict the user needs with the given data. Before, there were some algorithms which are fast and not secure one, another set of algorithm which has a security based protocol but the processing time is...

    Provided By IRD India

  • White Papers // Mar 2015

    Data Mining with Big Data: A Survey

    Big data is a new term for a large and complicated data set that it becomes difficult to process using a traditional data management tools. Big data are now growing rapidly in all science and engineering domains, including biological, physical and bio-medical sciences. Big data mining is the art of...

    Provided By IRD India

  • White Papers // Mar 2015

    Effective Secure Multi-Keyword Top-K Retrieval Over Relational Databases

    Keyword has emerging as a promising pattern for data outsourcing and high-quality data services. However, concerns of sensitive information on potentially cause privacy problems. Data encryption protects data security to some extent, but at the cost of compromised efficiency. Searchable Symmetric Encryption (SSE) allows retrieval of encrypted data. In this...

    Provided By IRD India

  • White Papers // Mar 2015

    Parallel Mining of High Utility Itemsets From Large Transactional Databases

    In this paper, the authors generate the high utility (profitable) item sets in a parallel environment, by considering the both profit and quantity of each item. The parallel mining of high utility item sets will take very less time than mining with the single system over large number of transactions....

    Provided By IRD India

  • White Papers // Mar 2015

    Accurate Results on Shared Memory Multi-Core Processors

    As days are passing, technology is taking its force towards its smartness. But, there are some devices which are to be modified for better accurate results. Parallel processing is the simultaneous use of more than one CPU or processor core to execute a program or multiple computational threads. Ideally, parallel...

    Provided By IRD India

  • White Papers // Mar 2015

    Graphene Based Transistor: G-FET

    It has come to a time, when the search beyond silicon for using it in transistors has gained serious importance. If the researcher's prediction is to be substantiated in today's world, then a post silicon age in the semi-conductor industry is to be ushered soon. In this paper, graphene-derived nano-materials...

    Provided By IRD India

  • White Papers // Mar 2015

    Design of Fast Multipliers Using Vedic Mathematics

    Vedic mathematics is the ancient mathematics which has unique technique of mental calculation with help of simple rules and principles based on 16 sutras. Urdhava-Tiryagbhyam sutra is one among the 16 sutra in Vedic mathematics. Urdhava-Tiryagbhyam multiplier provides high speed and regularity in layout or even combination of them. Binary...

    Provided By IRD India

  • White Papers // Feb 2015

    16-Bit Low Power Booth Encoded Multiplier Design Using GDI CMOS Logic

    Gate Diffusion Input (GDI) a new technique of designing a low-power digital combinational circuit is described. The technique allows reducing power consumption, propagation delay and area of digital circuits while maintaining low complexity of logic design. The GDI approach allows implementation of a wide range of complex logic functions using...

    Provided By IRD India

  • White Papers // Feb 2015

    Data Anonymization Technique for Privacy Preservation on Mapreduce Framework

    Cloud computing is a revolutionary computing approach, which provides massive storage and computational capability. Cloud computing is a computing paradigm which enables flexible, on-demand and low cost usage of resources. These advantage, are the causes of privacy and security issues, which arises because data owned by different users are stored...

    Provided By IRD India

  • White Papers // Feb 2015

    One to Many Data Linkage Using One Class Clustering Tree

    In many domains one-to-many data linkage is an essential task, however, many of the publications have not addressed this paper. Traditionally, data linkage is performed among the entities of similar type, however, developing linkage techniques that link between matching entities of different types is also very important. In this paper,...

    Provided By IRD India

  • White Papers // Jan 2015

    Design of Low Power Digital CMOS Comparator

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The Comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Dec 2014

    Project Management- Is It Managing Technical Skills or Human Skills?

    With the fast changing world and technological developments, project management as a science and art has developed by leaps and bounds. This paper aims to study what are the skills required by a manager to be an excellent project manager. The human skills are analyzed to know its elements. The...

    Provided By IRD India

  • White Papers // Dec 2014

    Delay Redundant Multi Operand Adder Using Cyclic Combinational Method

    In this paper, the authors propose the efficient implementation of multioperand redundant compressor trees in modern FPGAs by using their fast carry resources. Their approaches strongly reduce delay and they generally present no area overhead compared to a CPA tree. Moreover, they could be defined at a high level based...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of 4X4 Vedic Multiplier Using Power Gating Method

    In this paper, the authors propose a various multipliers implemented using CMOS logic style and their comparative analysis on the basis of power and PDP (Power Delay Product). A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively...

    Provided By IRD India

  • White Papers // Dec 2014

    Dynamic Resource Scheduling & Monitoring in Cloud Computing

    Cloud computing allows clients to range upwards and downwards their resource convention based on requirements. Many of cloud versions come from resources multiplexing by using virtualization technology. To decrease energy wastage by idle server, the traditional way is to keep a server to sleep throughout unused period, with a alternative...

    Provided By IRD India

  • White Papers // Dec 2014

    Robust Node Clone Detection in Arbitrary Wireless Networks

    Wireless networks have an impact of responsiveness in ancient times as a result of their wide variety of vicinity. In general, WSNs include 100s or even 1000s of inexpensive, source constrained, scattered sensor nodes, which frequently spread within the scrutiny vicinity arbitrarily. Consider process upbringing is poor, protection mechanisms are...

    Provided By IRD India

  • White Papers // Dec 2014

    A Novel Design of All Digital Phase Locked Loop for VLSI Applications

    The design of the ADPLL must intend to have a phase detection system with higher phase accuracy for minimum phase error. The need for All Digital Phase Locked Loop (ADPLL) was required basically because the microprocessors do not have enough processing power at such high frequencies even though with integrated...

    Provided By IRD India

  • White Papers // Dec 2014

    Adaptive Supply Voltage for Combinational Circuits Using MPR

    VLSI circuits of the 45-nm technology and beyond are increasingly affected by process variations as well as aging effects. Overcoming the variations inevitably requires additional power expense, which in turn aggravates the power and heat problem. Adaptive Supply Voltage (ASV) is an arguably power efficient approach for variation resilience since...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of a High Performance Multiplier Using MT-CMOS Technique

    A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively large. This paper proposed a high performance and power efficient 8x8 multiplier design based on Vedic mathematics using CMOS logic style. In this paper, XNOR gates with MTCMOS...

    Provided By IRD India

  • White Papers // Dec 2014

    Automatic Vehicle Speed Control System Using Wireless Fidelity

    Globally road accident is considered to be an important issue, which can be reduced by proper vehicle speed monitoring system. More recently, the advancement in wireless sensor technology shows a great promise in designing Intelligent Transportation System (ITS) due to its flexibility and cost-effectiveness for deployment. This paper is to...

    Provided By IRD India

  • White Papers // Nov 2014

    Design of Low Power Scalable Digital CMOS Comparator Using a Parallel Prefix Tree

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Nov 2014

    Automatic Electrical Meter Reading System and Remote Monitoring Using Zigbee

    The automatic metering system is designed to make the prevailing electricity billing system simpler and efficient. The conventional metering system is done manually. An employee of the Electricity Board will be coming to take the reading and enter in the card. There are more chances of manual error, delay in...

    Provided By IRD India

  • White Papers // Nov 2014

    ICPS: Intelli Cloud Print Service

    When the authors observe the growing era of technical trends, there is a great push towards the cloud based applications and proliferation of web connected mobile devices. As there is a tremendous growth of smart phones/tablets, people are expecting the same capabilities of their PC's in their smart devices and...

    Provided By IRD India

  • White Papers // Nov 2014

    Designing of Ripple Carry Adder Using Domino Logic

    In this paper, new design a proposed logic design targeting at full-custom high speed applications. The constant delay characteristic of this logic style regardless of the logic expression makes it suitable in implementing complicated logic expression such as addition. This feature enables performance advantage over static and dynamic, CD logic...

    Provided By IRD India

  • White Papers // Nov 2014

    Design and Implementation of 2-Digit Adder Using Quaternary Signed Digit Number System

    With the quaternary signed digit number system one may perform carry free addition, borrow free subtraction and multiplication. But with the binary number system, the computational speed is limited by formation and propagation of carry especially as the number of bits increases. However, the QSD number system requires a different...

    Provided By IRD India

  • White Papers // Nov 2014

    A Novel Test Pattern Generator for Functional Broadside Tests

    In this paper, an accumulator-based 3-weight test pattern generation scheme is presented. The proposed scheme copes with the inherent drawbacks of the scheme proposed more precisely. First, it does not impose any requirements about the design of the adder i.e., it can be implemented using any adder design and then...

    Provided By IRD India

  • White Papers // Nov 2014

    MIMO-OFDM Wireless Communications

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. It can be thought of as a combination of modulation and multiple access schemes that segment a communication channel in such a way that many users can share it. It segments according to frequency. It...

    Provided By IRD India

  • White Papers // Nov 2014

    A High Performance CRC Checker for Ethernet Application

    In this paper, the authors present the generation of Cycle Redundancy Check (CRC) in the field of data communication and networking. CRCs are popular because they are simple to implement in binary hardware, are easy to analyze mathematically, and are particularly good at detecting common errors caused by noise in...

    Provided By IRD India

  • White Papers // Nov 2014

    Asynchronous Design of Energy Efficient Parallel Adder

    In this paper, the authors present power analysis of the 4 bit Parallel adder reported as having a low PDP (Power Delay Product), by means of speed, power consumption and area. The full adders were designed upon various logic styles to derive the sum and carry outputs. The conventional 4...

    Provided By IRD India

  • White Papers // Aug 2014

    Mobility Based Key Management Scheme of Wireless Sensor Network

    In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink...

    Provided By IRD India

  • White Papers // Aug 2014

    Cybercrime Analysis and Data Mining Methodologies

    Crime is identified as an act which is punishable by legislation in accordance with Thakur. However, an act that is considered as a crime in one place and time may not be true in another place or time. In this paper, the authors presented about the crime data mining a...

    Provided By IRD India

  • White Papers // Aug 2014

    Enhanced File Security Using Encryption and Splitting Technique Over Multi-Cloud Environment

    Cloud computing is a fastest growing technology. It allows business organizations to use or access different applications, store information without access their personal files. While considering the power, stability and the security of cloud one can't ignore different threats to user's data on cloud storage. File access assure in real...

    Provided By IRD India

  • White Papers // Aug 2014

    A Novel Symmetric Key Cryptography Based on Doubly Even Order Magic Square

    Now-a-days with the global acceptance of the Internet, the people communication becomes faster and easier. Every computer is connected virtually to every other through internet. Therefore, cryptography becomes a crucial aspect for secure communication to protect important data from eavesdroppers. In this paper, a session based bit level symmetric key...

    Provided By IRD India

  • White Papers // Aug 2014

    LAN Based Secured Active Data Dissemination in Mobile Social Networks

    In Mobile Social Networks (MSNets), data dissemination is very important, which has not been widely investigated yet. Active data dissemination is a networking paradigm where a superuser intentionally facilitates the connectivity in the network. One of the key challenges is how to design the most efficient superuser route to achieve...

    Provided By IRD India

  • White Papers // Mar 2014

    Reduced Transmission of Application Information Security on Android with Synchronization

    In present days, mobile phones which use android operating system is equipped with richer applications than mobile phones with traditional operating system. These makes user to store most of the information on mobile phones. The mobile phones with android operating system need to be upgrades with latest version of its...

    Provided By IRD India

  • White Papers // Mar 2014

    IEEE 802.11ac: Enhancing Throughput and MAC Layer Performance With Rate Adaptation Algorithm

    The IEEE 802.11ac is an emerging Very High Throughput (VHT) WLAN standard, targeted to achieve data rates close to 6.9 Gbps for 5GHz spectrum band. The paper presents the throughput analysis of 802.11ac MAC layer with help of rate adaptation algorithm to show efficacy of 802.11ac over 802.11n WLAN standard...

    Provided By IRD India

  • White Papers // Apr 2014

    Denial of Service Attacks in Wireless Sensor Networks

    Network survivability is the capacity of a network keeping connected under loss and intrusions, which is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses about...

    Provided By IRD India

  • White Papers // Jul 2014

    FPGA Implementation of Data Encryption and Decryption Using Optimized LED Algorithm

    In this paper, the authors present Light weight Encryption Device (LED) on Field Programmable Gate Array (FPGA). An optimized code for the light weight encryption algorithm with 128 bits key size and 64 bits block size has been developed. They have designed iterative architecture for speed improvements and hardware elements...

    Provided By IRD India

  • White Papers // Jul 2014

    Comparative Study of Data Mining Clustering Algorithms

    Clustering is the process of grouping physical or abstract objects into classes of similar objects. These groups of similar objects are called clusters. Objects in one cluster are very similar to other objects in that particular cluster but very dissimilar when compared to objects in other clusters. Portraying data by...

    Provided By IRD India

  • White Papers // Apr 2014

    Survey on Various Congestion Detection and Control Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSN's) are expected to have wide range of applications and increasing deployment in the near future as it provides a low cost solution with respect to both maintenance and installation. WSN's are distributed self-governing sensors used to monitor the physical conditions of the environment. They are constructed...

    Provided By IRD India

  • White Papers // Apr 2014

    DSA - A Reliable Intrusion-Detection System for MANETs

    MANET (Mobile Ad hoc NETwork) meant to be work under the Infrastructure less medium; it suffers from the limited bandwidth, dynamic topology problems etc. There is no base station or central control for the network and all nodes work autonomously. These characteristics are highly favorable for malicious user to entering...

    Provided By IRD India

  • White Papers // Aug 2014

    Efficient Hierarchical Based Routing Protocol Enhancement for Energy Balancing and Prolonging the Lifetime of the WSNs

    Wireless Sensor Network (WSN) is a wireless network consisting of spatially distributed autonomous tiny computing devices, each equipped with sensors, a wireless radio, a processor, and a power source. Sensor networks are envisioned to be deployed in the physical environment in order to monitor a wide range of environmental phenomena....

    Provided By IRD India

  • White Papers // Aug 2014

    Distance Based Node Election for Energy Efficient Routing in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is a form of ad hoc network consisting of tens to thousands of distributed autonomous tiny computing devices each equipped with sensors, a wireless radio, a processor, and a power source. Because of military applications such as battlefield surveillance the wireless sensor networks are originally...

    Provided By IRD India

  • White Papers // Jun 2014

    Comparative Study of Duty Cycle and Network Coding Based Analysis of Lifetime for Wireless Sensor Networks

    Wireless Sensor Network (WSN) consists of autonomous sensor nodes which are equipped with limited battery and requires energy management for enhanced Network Lifetime. The area around the sink forms a bottleneck zone due to heavy traffic-flow will be in demand of more power which limits the network lifetime. This paper...

    Provided By IRD India

  • White Papers // Oct 2013

    Secure Banking Application Using Visual Cryptography Against Fake Website Authenticity Theft

    Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of...

    Provided By IRD India

  • White Papers // Oct 2013

    Reducing Access Delay in Machine to Machine Wireless Communication Over LTE

    Machine type communication is the new buzz in 4th generation mobile technology. Trillions of machines are deployed under one base station and they try to access the network in random fashion. Handling so many devices is a big problem and it needs proper solution to avoid overloading of the network....

    Provided By IRD India

  • White Papers // Oct 2013

    Comparison of Initial and Continuous Neighbor Discovery in Asynchronous Sensor Networks

    In most sensor networks the nodes are static. Nevertheless, node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchronization between neighboring nodes. Hence, even after a sensor is aware of its immediate neighbors, it must continuously maintain its view, a process...

    Provided By IRD India

  • White Papers // Aug 2013

    Delay Performance of Multi-Hop Wireless Sensor Networks with Mobile Sinks

    A mobile Wireless Sensor Networks (WSN) owes its name to the presence of mobile sinks or sensor nodes within the network. This paper has transmission of packets from source to the destination sink by reducing delay and improving network lifetime constraints. End-to-end delay analysis can be used in wireless sensor...

    Provided By IRD India

  • White Papers // Sep 2013

    A Survey on Large Scale Overlay for Query Processing in P2P Network

    The scalability of a feedback aggregating overlay is the most fundamental requirement for large-scale P2P computing. In Peer-To-Peer (P2P) trust management feedback provides an efficient and effective way to build a reputation-based trust relationship among peers. In this paper, the authors proposed a Scalable Feedback Aggregating (SFA) overlay for large-scale...

    Provided By IRD India

  • White Papers // Aug 2014

    Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic Applications in MANETs

    Security in Mobile Ad hoc NETworks (MANETs) is a critical issue. MANETs are vulnerable to different types of attacks. Many of the routing attacks have been identified at network layer such as black hole, worm hole, gray hole and byzantine attacks. Out of all these attacks, black hole is the...

    Provided By IRD India

  • White Papers // Jul 2014

    Bandwidth Efficient Remote Video Surveillance System

    In this paper, the authors present an experimental work on video surveillance system which is capable of monitoring a desired room for security purpose. The system will continuously keep track of particular location with help of camera installed and obtain database of image frames from video. Adjacent frames are compared...

    Provided By IRD India

  • White Papers // Jul 2014

    A Distributed Channel Assignment Algorithm for Uncoordinated WLANs

    Campus and enterprise wireless networks are increasingly characterized by ubiquitous coverage and rising traffic demands. Efficiently assigning channels to Access Points (APs) in these networks can significantly affect the performance and capacity of the WLANs. In this paper, communication efficiency can be improved significantly by using a distributed channel assignment...

    Provided By IRD India

  • White Papers // Jul 2014

    Examining Search-Based Algorithms in Software Testing

    Software testing is a way of improving software quality. It is an essential and an expensive phase of Software Development Life Cycle (SDLC). There has been an ongoing research in this field to automate the process of software testing so that expenses can be reduced. But size and complexity of...

    Provided By IRD India

  • White Papers // Feb 2014

    Artificial Immune System for Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is vulnerable to routing misbehavior, due to faulty or malicious nodes. Misbehavior detection systems are designed to remove this vulnerability. The authors' system uses the concepts of Artificial Intelligence (AI) and Human Immune System (HIS) to detect misbehavior in routing protocol. In their system...

    Provided By IRD India

  • White Papers // Feb 2014

    Survey of Detection of Malicious Nodes in Peer to Peer

    Peer-To-Peer (P2P) streaming has witnessed a great success, thanks to the possibility of aggregating resources from all participants. However, performance of the entire system may be highly degraded due to the presence of malicious peers that share bogus data on purpose. In a Peer-To-Peer (P2P) streaming system, since each peer...

    Provided By IRD India

  • White Papers // Feb 2014

    A Survey on Data Dissemination to Mobile Sink Groups in Wireless Sensor Networks

    In past few years, the domain of data dissemination in wireless sensor networks has been the area of interest to be researched. Whenever there is context of mobile sink groups, the data delivery relates to a complex mechanism because mobile groups have a feature to move in a collective manner....

    Provided By IRD India

  • White Papers // Feb 2014

    Instance Level Constraint Based User Clustering

    Clustering with constraints is fairly recent trend of development which allows a domain expert's interference in the clustering process. The authors use modified objective function of k-means algorithm to incorporate constraints to cluster twitter users. In this paper, they generate instance level constraints using normalized cosine measure, do basic filtering...

    Provided By IRD India

  • White Papers // Feb 2014

    Address Allocation in Manet - A Literature Survey

    A mobile ad hoc network is a network with nodes which are self-configuring and that route the messages themselves. Hence, there is no need for additional infrastructure to build the network. However, lack of infrastructure makes the address allocation in the ad hoc network difficult. There are events like partitioning,...

    Provided By IRD India

  • White Papers // Feb 2014

    Two Factor Framework for Web Based Social Network Based on PKI

    Passwords provide security mechanism for authentication and protection services against unwanted access to resources. A graphical based password is one promising alternatives of textual passwords. and it must protected by assigning a password to gain unauthorized access to that data, because the privacy, integrity and confidentiality are the most important...

    Provided By IRD India

  • White Papers // Feb 2014

    An Efficient Provision of Selfadaptive Multi Media Streaming Service for Android Phones

    Mobile devices now-a-days are widespread and provide great multimedia capabilities, which provide the efficient delivery of live video streaming. Multimedia information can be obtained easily using mobile devices, allowing users to enjoy ubiquitous network services. Cloud multimedia streaming have disruptively occupied bandwidth in wireless network, which poses many challenges in...

    Provided By IRD India

  • White Papers // Feb 2014

    Big Data Intelligence on Logistics

    The logistics industry is competing in a changing and continuously challenging world. As the people economy is moving into this new information age, logistics industries are facing a lot of challenges as well as opportunities. The advancement of e-commerce and evolution of new data sources like sensors; GPS, Smartphone's etc...

    Provided By IRD India

  • White Papers // Feb 2014

    Data Extraction From Wireless Sensor Network with Cloud Computing

    WSN have several applications in different domains. WSN enables the information gathering across the spectrum of Endeavour including environmental monitoring, home automation, tracking, health care, business etc. But the gathered information is not used adequately because of the lack of expertise and storage for further use. To overcome this problem...

    Provided By IRD India

  • White Papers // Jul 2014

    Threshold Based Intrusion Detection System for MANET Using Machine Learning Approach

    Ad hoc nature of Mobile Ad hoc NETwork makes MANET most promising communication model in rescue and military areas. Its dynamicity property and infrastructure less deployment invites attacker (insider or outsider) to disrupt the MANET. Hosts itself as a router makes cooperation better but finding the route has inherent weakness...

    Provided By IRD India

  • White Papers // Apr 2014

    A Survey on Energy Conservation Techniques in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) have been a growing domain of research for the past few decades. The tasks performed by this network is basically sensing of required data as per the application by the deployed sensor nodes, collecting and processing the required data and forwarding the data of interest to...

    Provided By IRD India

  • White Papers // Aug 2013

    Probabilistic Approach Towards Sustaining Higher Performance Indicators in WSN

    Wireless sensor networks are a class of distributed systems that sense their data from the surroundings in real time. Compared with the traditional wireless networks, wireless sensor networks have energy constraints, low-data-rate of high redundant and data flow of high-to-one, and so on. Energy effectiveness is the key performance indicators...

    Provided By IRD India

  • White Papers // Aug 2013

    Performance Evaluation of Node Disjoint Multipath Routing Protocol Based on AODV for MANETs

    Mobile Ad-hoc NETworks (MANETs) is a collection of mobile nodes that can communicate with each other using multi-hop wireless links without utilizing any fixed base station infrastructure and centralized management. MANETs are typically characterized by dynamic topology, high node mobility, low channel bandwidth, limited battery power and frequent link failures,...

    Provided By IRD India

  • White Papers // Aug 2013

    QualNet Simulation of VANET Scenario for TLE (Traffic Light Environment) Performance Evaluation

    Vehicular Ad-hoc NETworks (VANETs) are attracting considerable attention from the research community and the automotive industry to improve the services of Intelligent Transportation System (ITS). As today's transportation system faces serious challenges in terms of road safety, efficiency, and environmental friendliness, the idea of so called \"ITS\" has emerged. Due...

    Provided By IRD India

  • White Papers // Aug 2013

    SMS Based Wireless E-Notice Board

    In this paper, the authors explain about SMS based wireless e-notice board and how to establish an effective and reliable communication between a mobile phone and a microcontroller using GSM modem. This GSM based e-notice board has various applications used in several domains including banks, stoke exchanges, traffic control, public...

    Provided By IRD India

  • White Papers // Aug 2013

    Microstrip Antenna for GPS Band

    In recent years, microstrip antennas have received much attention and have become one of the most successful topics in the telecommunications field. This success stems from well-known advantages, such as, low profile, low cost, ease of construction, conformal geometry and flexibility in terms of radiation pattern, gain and polarization. The...

    Provided By IRD India