IRD India

Displaying 1-40 of 200 results

  • White Papers // Feb 2015

    16-Bit Low Power Booth Encoded Multiplier Design Using GDI CMOS Logic

    Gate Diffusion Input (GDI) a new technique of designing a low-power digital combinational circuit is described. The technique allows reducing power consumption, propagation delay and area of digital circuits while maintaining low complexity of logic design. The GDI approach allows implementation of a wide range of complex logic functions using...

    Provided By IRD India

  • White Papers // Jan 2015

    Design of Low Power Digital CMOS Comparator

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The Comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Dec 2014

    Delay Redundant Multi Operand Adder Using Cyclic Combinational Method

    In this paper, the authors propose the efficient implementation of multioperand redundant compressor trees in modern FPGAs by using their fast carry resources. Their approaches strongly reduce delay and they generally present no area overhead compared to a CPA tree. Moreover, they could be defined at a high level based...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of 4X4 Vedic Multiplier Using Power Gating Method

    In this paper, the authors propose a various multipliers implemented using CMOS logic style and their comparative analysis on the basis of power and PDP (Power Delay Product). A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively...

    Provided By IRD India

  • White Papers // Dec 2014

    Dynamic Resource Scheduling & Monitoring in Cloud Computing

    Cloud computing allows clients to range upwards and downwards their resource convention based on requirements. Many of cloud versions come from resources multiplexing by using virtualization technology. To decrease energy wastage by idle server, the traditional way is to keep a server to sleep throughout unused period, with a alternative...

    Provided By IRD India

  • White Papers // Dec 2014

    Robust Node Clone Detection in Arbitrary Wireless Networks

    Wireless networks have an impact of responsiveness in ancient times as a result of their wide variety of vicinity. In general, WSNs include 100s or even 1000s of inexpensive, source constrained, scattered sensor nodes, which frequently spread within the scrutiny vicinity arbitrarily. Consider process upbringing is poor, protection mechanisms are...

    Provided By IRD India

  • White Papers // Dec 2014

    An Efficient Implementation of a High Performance Multiplier Using MT-CMOS Technique

    A variety of multipliers have been reported in the literature but power dissipation and area used by these multiplier circuits are relatively large. This paper proposed a high performance and power efficient 8x8 multiplier design based on Vedic mathematics using CMOS logic style. In this paper, XNOR gates with MTCMOS...

    Provided By IRD India

  • White Papers // Dec 2014

    Adaptive Supply Voltage for Combinational Circuits Using MPR

    VLSI circuits of the 45-nm technology and beyond are increasingly affected by process variations as well as aging effects. Overcoming the variations inevitably requires additional power expense, which in turn aggravates the power and heat problem. Adaptive Supply Voltage (ASV) is an arguably power efficient approach for variation resilience since...

    Provided By IRD India

  • White Papers // Dec 2014

    Automatic Vehicle Speed Control System Using Wireless Fidelity

    Globally road accident is considered to be an important issue, which can be reduced by proper vehicle speed monitoring system. More recently, the advancement in wireless sensor technology shows a great promise in designing Intelligent Transportation System (ITS) due to its flexibility and cost-effectiveness for deployment. This paper is to...

    Provided By IRD India

  • White Papers // Nov 2014

    Design of Low Power Scalable Digital CMOS Comparator Using a Parallel Prefix Tree

    In this paper, the authors propose a comparator design using conventional digital CMOS cells featuring wide-range and high-speed operation. The comparison is most basic arithmetic operation that determines whether one number is greater than, less than or equal to the other number. Their comparator uses a novel scalable parallel prefix...

    Provided By IRD India

  • White Papers // Nov 2014

    Automatic Electrical Meter Reading System and Remote Monitoring Using Zigbee

    The automatic metering system is designed to make the prevailing electricity billing system simpler and efficient. The conventional metering system is done manually. An employee of the Electricity Board will be coming to take the reading and enter in the card. There are more chances of manual error, delay in...

    Provided By IRD India

  • White Papers // Nov 2014

    ICPS: Intelli Cloud Print Service

    When the authors observe the growing era of technical trends, there is a great push towards the cloud based applications and proliferation of web connected mobile devices. As there is a tremendous growth of smart phones/tablets, people are expecting the same capabilities of their PC's in their smart devices and...

    Provided By IRD India

  • White Papers // Nov 2014

    Designing of Ripple Carry Adder Using Domino Logic

    In this paper, new design a proposed logic design targeting at full-custom high speed applications. The constant delay characteristic of this logic style regardless of the logic expression makes it suitable in implementing complicated logic expression such as addition. This feature enables performance advantage over static and dynamic, CD logic...

    Provided By IRD India

  • White Papers // Nov 2014

    Design and Implementation of 2-Digit Adder Using Quaternary Signed Digit Number System

    With the quaternary signed digit number system one may perform carry free addition, borrow free subtraction and multiplication. But with the binary number system, the computational speed is limited by formation and propagation of carry especially as the number of bits increases. However, the QSD number system requires a different...

    Provided By IRD India

  • White Papers // Nov 2014

    A Novel Test Pattern Generator for Functional Broadside Tests

    In this paper, an accumulator-based 3-weight test pattern generation scheme is presented. The proposed scheme copes with the inherent drawbacks of the scheme proposed more precisely. First, it does not impose any requirements about the design of the adder i.e., it can be implemented using any adder design and then...

    Provided By IRD India

  • White Papers // Nov 2014

    MIMO-OFDM Wireless Communications

    Orthogonal Frequency Division Multiplexing (OFDM) is a popular method for high data rate wireless transmission. It can be thought of as a combination of modulation and multiple access schemes that segment a communication channel in such a way that many users can share it. It segments according to frequency. It...

    Provided By IRD India

  • White Papers // Nov 2014

    A High Performance CRC Checker for Ethernet Application

    In this paper, the authors present the generation of Cycle Redundancy Check (CRC) in the field of data communication and networking. CRCs are popular because they are simple to implement in binary hardware, are easy to analyze mathematically, and are particularly good at detecting common errors caused by noise in...

    Provided By IRD India

  • White Papers // Nov 2014

    Asynchronous Design of Energy Efficient Parallel Adder

    In this paper, the authors present power analysis of the 4 bit Parallel adder reported as having a low PDP (Power Delay Product), by means of speed, power consumption and area. The full adders were designed upon various logic styles to derive the sum and carry outputs. The conventional 4...

    Provided By IRD India

  • White Papers // Nov 2014

    A Digital CMOS Parallel Counter Architecture

    In this paper, the authors consist of the state look-ahead path and the counting path. The proposed counter is a single mode counter, which sequences through a fixed set of pre assigned count states, of which each next count state represents the next counter value in sequence. The counter is...

    Provided By IRD India

  • White Papers // Nov 2014

    Design Low-Power Pulse-Triggered Flip-Flop Design Based on a Signal Feed-Through Scheme

    In this paper, analysis of average power, delay and power delay product is done by shift register using 90 nm technology. Low power flip-flops are crucial for the design of low-power digital systems. As Metal Oxide Semiconductor Field Effect Transistor (MOSFET) devices are scaled down to nanometer ranges, Complementary MOS...

    Provided By IRD India

  • White Papers // Nov 2014

    State Predictive LQI Congestion Control for TCP/AQM Networks Considering Effective Equilibrium Points

    The purpose of this paper is to design state predictive LQI congestion controllers by considering effective equilibrium points of nonlinear models of TCP/AQM networks and to illustrate the effectiveness of the designed congestion controllers via the NS-2 (Network Simulator ver.2) simulator. First nonlinear models of TCP/AQM networks are linearized at...

    Provided By IRD India

  • White Papers // Oct 2014

    Node Pairs Discovery Algorithm - Tracking Mechanism for VANET

    The purpose of V2I communication, a major component of VANET has been introduced already for improved transport infrastructure by minimizing collisions, traffic jams and improved management of operations for safety of traffic on a dense road scenario. The authors' incorporation would be aiming at establishment of a Node Pairs Discovery...

    Provided By IRD India

  • White Papers // Oct 2014

    Cooperative Game Theory Approach for the Cognitive Radio Users

    Wireless mobile communication plays a vital role in the people life. The facility of anywhere anytime communication services availability can be handled by management of resources efficiently. The quality of service offered to users may be enhanced through innovative protocols and new technologies. Future trends in wireless computing should take...

    Provided By IRD India

  • White Papers // Oct 2014

    A Survey on SaaS Related Security Issues in Cloud Computing

    Internet has been a driving force towards the various technologies that have been developed since its inception, cloud computing paradigm has witnessed an enormous shift towards its adoption and it has become a trend in the information technology space as it promises significant cost reductions and new business potential to...

    Provided By IRD India

  • White Papers // Oct 2014

    Different IaaS Security Attributes and Comparison of Different Cloud Providers

    Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources like networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction. Despite such promises, cloud computing has not been...

    Provided By IRD India

  • White Papers // Oct 2014

    Adaptive Defect Detection Framework for Software Developed Under Environmental Heterogeneity

    Traditional testing methods are not successful in detecting concealed flaws in tough embedded software like device drivers or file systems. This leads to a huge expenditure through maintenance cost to the industrialist. In order to overcome this limitation of the traditional testing methods, with a great analysis model checking techniques...

    Provided By IRD India

  • White Papers // Oct 2014

    Pattern Based Attendance System Using RF Module

    In this paper, the authors aim at implementing biometric capable technology that can be used in automating the entire attendance system for the students pursuing courses at an educational institute. The goal can be disintegrated into finer sub-targets; fingerprint capture, identification, and wireless transfer of identification information. For each sub-task,...

    Provided By IRD India

  • White Papers // Oct 2014

    Cloud Computing: A New Paradigm in Utility Computing

    Cloud computing can be regarded as integration of various computing technologies which offered better utilization of resources but could not achieve optimized performance. Cloud computing made use of all existing technologies like grid and utility, including internet to deliver infrastructure, applications and business processes as services to its users. It...

    Provided By IRD India

  • White Papers // Sep 2014

    Intrusion Detection System Using Cascade Forward Neural Network with Genetic Algorithm Based Feature Selection

    Due to the rapid expansion and advancements of computer network, security has become a vital issue for modern computer network. The network intrusion detection systems play the vital role in protecting the computer networks. So, it has become a significant research issue. In spite of notable progress in intrusion detection...

    Provided By IRD India

  • White Papers // Sep 2014

    Design of High Speed and Low Power 5:3 Compressor Architectures Using Novel Two Transistor XOR Gates

    In this paper, the authors propose architectures of 5:3 compressor designs for low power multiplication purposes. The architecture explores the essence of two transistor multiplexer design and novel two transistor XOR gates for the proposed topology with least number of transistors for logic level implementation. The modified and proposed compressor...

    Provided By IRD India

  • White Papers // Sep 2014

    Design & Modification of RSA Algorithm with CRT & OAEP

    In many RSA cryptosystems, the authors usually select a small value for the public key e. This kind of choice can only speed up the encryption operation but do not forget that by this way, the corresponding decryption operation requires more computational time and therefore it costs more because of...

    Provided By IRD India

  • White Papers // Sep 2014

    Data Compression in Wireless Sensor Nodes Used for Data Acquisition of Slowly Changing Digital Events

    Energy conservation is an important consideration in Wireless Multimedia Networks (WMNs) powered by batteries. Energy optimization directly leads to increased lifetime of a WSN. In this paper, the authors consider a class of WSNs deployed to sense digital events and transmit the state values to a sink node. In these...

    Provided By IRD India

  • White Papers // Sep 2014

    8-Block Security System for Digital Envelope

    The sensitive information stored on computers and transmitted over the Internet need to ensure information security and safety measures. Without the authors' knowledge, the intruders sneak into the systems, misuse it and even create back doors to their computer systems. System contains valuable information which should not be in hands...

    Provided By IRD India

  • White Papers // Aug 2014

    Control System for Robotic Arms Over Controller Area Network (CRACAN)

    The most known network protocols for embedded systems are Event-Triggered Protocol (ETP) and Time-Triggered Protocol (TTP), which provide their own advantages of using them. Currently event-triggered protocol is used in vehicles, which means that in principle all activities are invoked by an event; most messages are transmitted periodically to the...

    Provided By IRD India

  • White Papers // Aug 2014

    Fuzzy Designing and Scheduling of Automotive ECUs Over Controller Area Network

    The technological advancements of embedded system and electronics within the vehicle are being driven by the challenge to make the vehicle safer, more energy efficient and networked. Implementation of Automotive tasks has become easier with various advancement in software and hardware design modules. These Automotive tasks are implemented on a...

    Provided By IRD India

  • White Papers // Aug 2014

    A Review of Factors and Data Mining Techniques for Employee Attrition and Retention in Industries

    In an exceedingly data driven economy, it's obvious that that raising as key competitive differentiators and retaining the talent pool has become a matter of dominant importance. This paper is to provide a background on attrition and also to enlist various factors that build staff displease. This paper also provides...

    Provided By IRD India

  • White Papers // Aug 2014

    Parallel Processing Shared Memory with Snoopy Cache

    Implementation of parallel processing with snoopy cache is an idea to enhance the performance of computing in real-time. When the authors consider uniprocessor the execution will take sequential. In uniprocessor they may not face problems. When they come to multi-core processors in parallel processing the program is divided into slices...

    Provided By IRD India

  • White Papers // Aug 2014

    Low Power and Area Efficient Folded Architecture for Row Bypassing Multiplier Using FPGA

    Optimizing power consumption and reducing hardware complexity are the most important criteria for the fabrication of DSP architectures. DSP operation must be completed within fixed time which demands the usage of high speed multiplier that consumes low power. In this work, a methodology to determine the best solution to this...

    Provided By IRD India

  • White Papers // Aug 2014

    Mobility Based Key Management Scheme of Wireless Sensor Network

    In this paper, a mobility management technique for keying scheme of wireless sensor networks is presented. The technique selects nodes with high energy resources, wide communication range and high processing capacity as cluster heads. Cluster keys for cluster heads and pair wise keys for nodes are generated by the sink...

    Provided By IRD India

  • White Papers // Aug 2014

    Cybercrime Analysis and Data Mining Methodologies

    Crime is identified as an act which is punishable by legislation in accordance with Thakur. However, an act that is considered as a crime in one place and time may not be true in another place or time. In this paper, the authors presented about the crime data mining a...

    Provided By IRD India

  • White Papers // Jul 2013

    Wi-Fi Infrastructure Security System from Vulnerable Attacks

    Wi-Fi is a very popular wireless technology which is powerful core for the global digital infrastructure. A device connected using Wi-Fi can access the network resource such as the Internet via a wireless network access point. Recent discoveries and initiatives highlight a simple fact that the core is just as...

    Provided By IRD India

  • White Papers // Jun 2013

    Secured Modified Bloom's Based Q-Composite Key Distribution for Wireless Sensor Networks

    The security issue in a Wireless Sensor Network (WSN) has been drawing considerable research attention in recent years. However Key management, a basic security service, becomes the core design for various security services, such as encryption and authentication. To increase the connectivity of each key in a large-scale WSN and...

    Provided By IRD India

  • White Papers // Nov 2013

    Mitigating Cloud Virtualization Vulnerabilities

    The main idea of cloud computing is to build a virtualized computing resource pool by centralizing abundant computing resources connected with network and present the service of infrastructure, platform and software. Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its infinite benefits. However,...

    Provided By IRD India

  • White Papers // Oct 2013

    Quantum Cryptography with Key Distribution in Wireless Network

    It is well known that wireless networks have become one of the most important part used communication systems, in particular for ubiquitous computing. However, providing secure communication for wireless networks has become one of the prime concerns. Quantum cryptography, namely Quantum Key Distribution (QKD), offers the promise of unconditional security....

    Provided By IRD India

  • White Papers // Jun 2013

    Implementation of AES Algorithm for Secured Wireless Transmission of Data for RFID Based Transactions

    The biggest challenge for current RFID technology is to provide the necessary benefits while avoiding any threats to the privacy of its users. Although many solutions to this problem have been proposed, almost as soon as they have been introduced, methods have been found to circumvent system security and make...

    Provided By IRD India

  • White Papers // Apr 2013

    Intrusion Detection by Facial Recognition Using CCTV Cameras with Video Management System

    The authors have worked with a renowned engineering company in their real time Project. The brief scope of this project is to propose a fool proof security system solution which includes the sub-system such as surveillance CCTV, video management & video analytics, wireless backbone. All these systems will be integrated...

    Provided By IRD India

  • White Papers // Jul 2013

    Contemplate for Online Plebiscite Capturing Using ATM Terminals

    Online voting (e-voting) is gaining its momentum as a flexible means of voting system that has been talked about very often but not been implemented successfully on a large scale. With the increased number of ATM terminals across the globe this paper proposes an ATM based contemplate for online plebiscite....

    Provided By IRD India

  • White Papers // Jun 2013

    Session Passwords for Android Mobiles

    The mobiles that are marketed today are developed with extended features that include the data storage. To protect the data most people make use of the textual passwords or graphical passwords in spite of its high security issues such as eavesdropping, dictionary attacks, social engineering and shoulder surfing. Hence, as...

    Provided By IRD India

  • White Papers // Aug 2013

    Tracking of Non Cooperative Target to Prevent the Gang Injection of False Data Attacks in Wireless Sensor Networks

    Wireless Sensor Network (WSN) is a collection of heterogeneous sensor nodes having limited computation capacity, restricted memory space, limited power, and short range of communication which all are connected by wireless network. It is vulnerable to security attacks, attacks may be in the form of injection of false data, injection...

    Provided By IRD India

  • White Papers // Dec 2012

    Mobile Commerce - New Way to Business

    The world wide web is now a practical medium for customers, information seekers, business owners and entrepreneurs. The increase in suppleness and power of internet provides proper opportunities for rising up services to customers. In today's scenario of business mobile commerce has entered in finance, services, retails, and telecommunication and...

    Provided By IRD India

  • White Papers // Jul 2013

    Architectural Framework to Provide SaaS as Delivery Model

    Service Oriented Architecture (SOA) is a revolutionary paradigm for developers in order to gain on time and cost. Software-as-a-Service (SaaS) is a delivery model which gain in enormous economy in deployment, management. In this paper, the authors have proposed a model that re-defines the architecture of SOA in way to...

    Provided By IRD India

  • White Papers // Jun 2013

    A Secured Retrieval of Quantitative Data In An Outsourced Environment

    In this paper, the authors consider a secured proximity querying of quantitative data from an un-trusted server. The data is to be revealed only to trusted user and not to anyone else. The need for security may be due to the data being sensitive, valuable or otherwise confidential. Given this...

    Provided By IRD India

  • White Papers // Aug 2013

    Obstruction of Undesired Traffic by Filtering Source Prefixes on the Internet

    In recent days, the Internet has seen a continuous rise in malicious traffic including DDoS attacks, worm attacks and spam. One way to deal with this problem is to filter unwanted traffic at the routers based on source IP addresses. Filtering techniques are available at routers today via Access Control...

    Provided By IRD India

  • White Papers // Nov 2013

    A Walk Through Clouds with Cloud Provisioning and Management

    In this paper, the authors describe \"Cloud computing\", a computing platform for the next generation of the Internet. In this paper, they define clouds, explain the business benefits of cloud computing, and outline the cloud architecture and its major components. The user will discover how a business can use cloud...

    Provided By IRD India

  • White Papers // Jul 2012

    Discovering Data Storage by Task Scheduling and Network Construction for Data Compression in Global Position System

    Data storage and transmission, task scheduling, and network construction used for that. The authors have proposed a clustering algorithm to find the group relationships for query and data aggregation efficiency. This paper are as follows: First, since the clustering algorithm itself is a centralized algorithm, in this paper, they further...

    Provided By IRD India

  • White Papers // Oct 2012

    BgpAND - Architecting a Modular BGP4 Attack & Anomalies Detection Platform

    Border Gateway Protocol (BGP) is an Autonomous System (AS) routing protocol. It forms the backbone of Internet core routing decisions. However, it is also equally prone to security issues and several attempts to attack & exploit the protocol have been noted. bgpAND is a platform designed and developed to analyze...

    Provided By IRD India

  • White Papers // Oct 2012

    Safer Data Transmission Using Steganography

    Today's Internet connected networks are under permanent attack by intruders and hackers. The explosive growth of computer systems and their interconnections has led to a heightened awareness of the need to protect the data transmitted. There are many ways already existing and also discovered daily. The field of cryptography has...

    Provided By IRD India

  • White Papers // Oct 2012

    A Scheme for Key Revocation in Wireless Sensor Networks

    Key revocation is a challenging task in wireless sensor networks. There can be many nodes in a sensor network sharing the same key(s) in their key ring. If any of those nodes in the network gets compromised then the keys of those nodes having same keys will also be revealed....

    Provided By IRD India

  • White Papers // Nov 2012

    Parallel Data Mining and Assurance Service Model Using Hadoop in Cloud

    In the information industry, huge amount of data is widely available and there is an imminent need for turning such data into useful information. This need is fulfilled by the process of exploration and analysis, by automatic or semi-automatic means, of large quantities of data provided by Data Mining. In...

    Provided By IRD India

  • White Papers // Dec 2012

    Multiple Trust in Trust-Based On-Demand Routing in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETworking is concept of communication, which means a communication temporary network without any form of centralized administration. Every node in this network acts both as host and a router to forward packets for other node. Due to the absence of the centralized administration, MANETs are easily attacked by...

    Provided By IRD India

  • White Papers // Dec 2012

    A High Speed Frequency Based Multimodal Biometric System Using Iris and Fingerprint

    In this paper, the authors adopt a unified viewpoint to extract singular points (core and delta) that determine the topological structure and largely influence the orientation field by using the principal of Gabor basis functions. Lastly the points are classified into classes by method of Poincare index for Fingerprint classification....

    Provided By IRD India

  • White Papers // Dec 2012

    Border Gateway Protocol - A Best Performance Protocol When Used for External Routing Than Internal Routing

    The paper addresses the interoperability issues between Internal Border Gateway Protocol (IBGP) over other Interior Gateway Protocols (IGPs) by knowing the characteristics of the respective protocols and also studies the efficiency of External Border Gateway Protocol (EBGP) as an Exterior Gateway Protocol (EGP). Furthermore, it shows how IGRP proves to...

    Provided By IRD India

  • White Papers // Jun 2013

    Two Phase Dynamic Channel Assignment Protocol on Multi-Channel Multi-Interface Wireless Ad Hoc Networks

    Using multiple channels over single channel the performance can be significantly increased since the use of multiple channels can reduce interference influence. Channel assignment is one of the most basic and major concern in such networks. By effectively utilizing multiple non overlapping channels and multiple interfaces, collision and co-channel interference...

    Provided By IRD India

  • White Papers // Jun 2013

    3 Dimensional Security in Cloud Computing

    Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. So it is emerging field...

    Provided By IRD India

  • White Papers // Jun 2013

    To Implement SaaS Multitenant Framework Security in Cloud Computing

    Cloud computing, a rapidly developing information technology, has aroused the concern of the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and...

    Provided By IRD India

  • White Papers // Apr 2013

    Enriching Mobile Multimedia Applications Using Cloud Mobile Media

    Cloud Mobile Gaming (CMG), an approach that enables rich multiplayer Internet games on mobile devices, where compute intensive tasks like graphic rendering are executed on cloud servers in response to gaming commands on a mobile device, and the resulting video has to be streamed back to the mobile device in...

    Provided By IRD India

  • White Papers // Apr 2013

    Articulate Features for Mobile-Social TV System Using Cloud Computing

    The recent cloud computing technology, with its rich resources to compensate for the limitations of mobile devices and connections, can potentially provide an ideal platform to support the desired mobile services. In this paper, Articulate Features for Mobile-Social TV System using Cloud Computing (CloudMoV) is proposed. This system effectively utilizes...

    Provided By IRD India

  • White Papers // Jul 2012

    Traffic Management Through Inter-Communication Between Cars Using VANET System

    Vehicular Ad-hoc NETwork (VANET) basically used to provide various services to its user. Misbehaviour of such system should be defended. VANET system provides the intercommunication between the vehicles by letting them exchange the traffic information. Such kind of exchanges may create privacy apprehension since the vehicle-generated information can contain much...

    Provided By IRD India

  • White Papers // Jul 2012

    Null Direction Propagation of Antennas and Counter Measures in Tactical High Frequency Sky Wave Communication

    In tactical High Frequency (HF) communication, sky wave and ground wave mode establish the radio link. There is a phenomenon by which antenna in ground wave mode communicates with antenna in sky wave mode. This happens due to emission of radio waves in the NULL direction. This emission can be...

    Provided By IRD India

  • White Papers // Jul 2012

    High Throughput Lossless Data Compression Algorithm

    Compression algorithms reduce the redundancy in data representation to decrease the storage required for that data. Data compression offers an attractive approach to reducing communication costs by using available bandwidth effectively. Though this scheme has clear benefits, the execution time of compression and decompression is critical to its application in...

    Provided By IRD India

  • White Papers // Jul 2012

    Achieving Privacy Preservation Schemas Against Traffic Analysis in Multi-Hop Wireless Networks

    Privacy threat is one of the critical issues in multihop wireless networks, where attacks such as traffic analysis and flow tracing can be easily launched by a malicious adversary due to the open wireless medium. Network coding has the potential to thwart these attacks since the coding/mixing operation is encouraged...

    Provided By IRD India

  • White Papers // May 2013

    Analytical Survey Model on Consumption of Cloud Service Models

    A new paradigm of computing is evolved that is cloud computing where word cloud is used as an allegory for the internet. The incarnation of this technology forces the organizations to rapidly shifting their IT systems from traditional client/server to cloud computing model where everything is offered as a service...

    Provided By IRD India

  • White Papers // Oct 2013

    A Review of Cloud Computing and Security Issues at Different Levels in Cloud Computing

    Cloud computing is one of exciting technology with its ability of minimizing costs associated with computing while increasing flexibility, scalability and availability for computer processes. Cloud computing can be viewed as different things to different people and its elastic nature makes it suitable to any organization. Cloud computing can do...

    Provided By IRD India

  • White Papers // Apr 2013

    Detection and Prevention of Web Application Security Attacks

    Today's Web applications can contain dangerous security flaws. The global distribution of these applications makes them prone to attacks that uncover and maliciously exploit a variety of security vulnerabilities. Research reports indicate that more than 80 percent of the web applications are vulnerable to security threats. User friendly web applications...

    Provided By IRD India

  • White Papers // Apr 2013

    A Ranking Based Approach in Security Alert for Handling Sensitive Data Organization

    An organization undoubtedly wants to preserve and retain data stored in an organization's computers. On the other hand, this data is necessary for daily work processes. Users within the organization's perimeter (e.g., employees, subcontractors, or partners) perform various actions on this data (e.g., query, report, and search) and may be...

    Provided By IRD India

  • White Papers // Apr 2013

    Credit Card Endorsement using Biometrics in Cloud Computing

    This application focused on the credit card authentication. The concept of biometrics is integrated along with the cloud for secure data access. The existing system of the credit card allows the user to do the transaction but there is no security measures to verify whether the user is authenticated or...

    Provided By IRD India

  • White Papers // Aug 2013

    Envisaging Roles for Access Security

    Access Control is the principle process of enterprise risk and Security Management. Role Based Access Control (RBAC) is the model for effective management of risk arises in safeguarding three important features of security Secrecy, Integrity and no Denial of Service (DoS). This paper addresses the new approach called \"Role visualization\"...

    Provided By IRD India

  • White Papers // Sep 2013

    Data Security for Unreliable Clouds Using Reliable Encryption

    Data Security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud. The risk of malicious insiders in the cloud and the failure of cloud services have received a great deal of attention by companies. This...

    Provided By IRD India

  • White Papers // Jul 2013

    Pair Hand: A Pairing-Based Cryptography to Secure Handover Process

    Seamless handover over multiple access points is highly desirable to mobile nodes, but ensuring security and efficiency of this process is challenging. This paper shows that prior handover authentication schemes incur high communication and computation costs and are subject to a few security attacks. Further, a novel handover authentication protocol...

    Provided By IRD India

  • White Papers // Jul 2013

    Development of CGI Based Front End for Implementation of Security Policies and Application Layer Filtering

    A system with vulnerabilities in operating system and installed software which are connected to internet are liable to attacks from the outside world as the outermost protecting layer firewall will not block all the attacks .So a second layer of protection can be built at the host level to prevent...

    Provided By IRD India