IRJCSEA

Displaying 1-23 of 23 results

  • White Papers // May 2013

    Adaptive Noise Reduction Techniques for VoIP Networks

    Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users. Among the...

    Provided By IRJCSEA

  • White Papers // Apr 2013

    Malware Classification Through HEX Conversion and Mining

    The malicious codes are normally referred as malware. Systems are vulnerable to the traditional attacks, and attackers continue to find new ways around existing protection mechanisms in order to execute their injected code. Malware is a pervasive problem in distributed computer and network systems. These new malicious executables are created...

    Provided By IRJCSEA

  • White Papers // Apr 2013

    User Profile Base Email Filter for Spam Mail

    E-mail is probably the most convenient method of transferring messages electronically from one person to another, emerging from and going to any part of the world. Important features of E-mail such as its speed, reliability, efficient storage options and a large number of added facilities make it highly popular among...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    An Analysis of Honeypots With Special Reference to Honeyd

    It's a herculean task for system administrators and normal web users to patch up their computers and keep all the software up to date. And in the case of Zero Day attacks there is very little which he can do to protect his system. One way to get early warnings...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Cloud Stream: Delivering High-Quality Streaming Videos Through a Cloud-Based Svc Proxy

    The rapidly increasing power of personal mobile devices (Smartphones, tablets, etc.) is providing much richer contents and social interactions to users on the move. This trend however is throttled by the limited battery lifetime of mobile devices and unstable wireless connectivity, making the highest possible quality of service experienced by...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Defending Disruption Tolerant Network From Misbehaving and Malicious Nodes

    Disruption Tolerant Network (DTN) is the key area in the fields of wireless network and is prone to high delay and disruption. DTN are designed to provide communications in the most unstable and stressed environments, where the network would normally be subject to frequent and long lasting disruptions and high...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Review: Performance Evolution of Different Routing Protocols in MANET

    Ad-hoc networks are basically self organizing and self configuring multi-hop mobile wireless network in which the information packets are transmitted in the manner as that in Massage Switching (store and forward) from a Transmitter to an arbitrary Receiver via intermediate Stations (nodes). A number of routing protocols like Dynamic Source...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Supporting Resourceful and Scalable Multicasting on Cellular Ad Hoc Networks

    Group communications are important in Mobile Ad hoc NETworks (MANET). Multicast is an efficient method for implementing group communications. However, it is challenging to implement efficient and scalable multicast in MANET due to the difficulty in group membership management and multicast packet forwarding over a dynamic topology. The authors propose...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Efficient Path Selection Metric for Hop-by-Hop Routing in Wireless Mesh Network

    Mesh is a network architecture that providing each node multiple possible connection path ways to every other node. Finding the path with the maximum available bandwidth in Wireless Mesh Network (WMN) is one of the parameter for supporting QoS. Here the authors propose a new routing metric called Efficient Path...

    Provided By IRJCSEA

  • White Papers // Jan 2013

    New Variant M-Rsa Cryptosystem With One Public Key and Two Private Keys

    In this paper, the authors present the design, develop and analyzed outputs of their threshold public key cryptosystem viz M (Multi Prime)-RSA cryptosystem with one public key and two private keys. They briefly discuss the possibility and validity of combining new variant with algorithm, Java code and test results to...

    Provided By IRJCSEA

  • White Papers // Jan 2013

    Solving Risk-Less, Scalable, and Delicate Data Access Management in Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access Management when users outsource sensitive data for sharing on cloud servers,...

    Provided By IRJCSEA

  • White Papers // Jan 2013

    Congestion Control Mechanism for WCDMA Based Wireless Networks

    WCDMA network is an important air interface technologies for cellular wireless networks. Traditionally in these wireless access networks, the base stations are connected to radio network controller or base station controller by Point to Point links. These Links are expensive and their use imposes and ongoing cost on the service...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Development and Evaluation of on Demand HRP in MANETS

    In mobile ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources used by the mobile nodes. The absence of any central coordinator makes the routing a complex one compared to cellular networks. The ad hoc on demand Hybrid Routing Protocols (HRP) routing algorithm is a...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Optimizing Energy and Improving Lifetime of Cluster Based Heterogeneous Protocol in Wireless Sensor Network

    The Wireless Sensor Network(WSN) has become an interesting field of research for gathering data in various situations. It has great potential value in many application areas such as in the military & national defense, environmental monitoring, remote monitoring dangerous areas & soon. Based on network structure, routing protocols in WSNs...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Energy-Efficient Protocol for Coactive Grids

    In Coactive Grids, transmitting and receiving nodes recruit neighboring nodes to assist in communication. The authors model a Coactive transmission link in wireless Grids as a transmitter cluster and a receiver cluster. They then propose a Coactive communication protocol for establishment of these clusters and for Coactive transmission of data....

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Secure Communications Using GDC in Cloud Computing

    Cloud computing has been envisioned as the next generation architecture of IT Enterprise Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Location Based Minimal Overhead Shortest Path Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is one consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. Mobile ad hoc networks are self-organizing and self-configuring multi hop wireless networks where, the structure of the network changes dynamically. Since a destination...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    A Priority Dynamic Upstream Bandwidth Allocation Algorithm for QoS Over Ethernet PONs

    Ethernet Passive Optical Networks (EPONs) are envisioned as a promising network technology to provide low cost high-speed solution for end user access to the broadband network. Ethernet is attractive because of the price declines in both fiber optics and Ethernet components. One of the issues that need to be addressed...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    Advancement in Firewalls Using UDP Hole Punching

    Firewalls separate areas of different security requirements. This major task leads to problems regarding the network connectivity and performance of various applications. In particular within distributed systems, like a Grid an unobstructed communication, which is essential for using distributed resources, is not possible. Furthermore Grid applications often use multiple ports...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    Security Issues in Social Networking

    Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner or across the globe. Social networking has transformed the way the connected masses communicate. Social network information is now being used in ways for which it may have not...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    Joint Perfection of Elaboration and Hanging for the Routing in Grouping Networks

    The grouping network structure was proposed in the early 80s and becomes popular nowadays. The routing Elaboration and the routing table size are the two primary performance measures in a dynamic route guidance system. Although various algorithms exist for finding the best routing policy in a Grouping network, hardly exists...

    Provided By IRJCSEA

  • White Papers // Oct 2012

    Determining ABC's of Cloud Computing

    Cloud Computing is an attractive computing model since it allows for resources to be provisioned according on a demand basis, i.e., cloud users can rent resources as they become necessary. Most of these services are available with a standardized access to the business logic through Internet. In today's competitive environment,...

    Provided By IRJCSEA

  • White Papers // Oct 2012

    Cloud Computing in South African SMMEs: Risks and Rewards for Playing at Altitude

    Cloud computing can offer an excellent value proposition to Small, Medium and Micro Enterprises (SMMEs), for whom cash flow, physical IT assets, and human resources are at a premium. However, recent industry surveys among SMMEs are not very conclusive in how its benefits and barriers are perceived and experienced by...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    An Analysis of Honeypots With Special Reference to Honeyd

    It's a herculean task for system administrators and normal web users to patch up their computers and keep all the software up to date. And in the case of Zero Day attacks there is very little which he can do to protect his system. One way to get early warnings...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Cloud Stream: Delivering High-Quality Streaming Videos Through a Cloud-Based Svc Proxy

    The rapidly increasing power of personal mobile devices (Smartphones, tablets, etc.) is providing much richer contents and social interactions to users on the move. This trend however is throttled by the limited battery lifetime of mobile devices and unstable wireless connectivity, making the highest possible quality of service experienced by...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Defending Disruption Tolerant Network From Misbehaving and Malicious Nodes

    Disruption Tolerant Network (DTN) is the key area in the fields of wireless network and is prone to high delay and disruption. DTN are designed to provide communications in the most unstable and stressed environments, where the network would normally be subject to frequent and long lasting disruptions and high...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Review: Performance Evolution of Different Routing Protocols in MANET

    Ad-hoc networks are basically self organizing and self configuring multi-hop mobile wireless network in which the information packets are transmitted in the manner as that in Massage Switching (store and forward) from a Transmitter to an arbitrary Receiver via intermediate Stations (nodes). A number of routing protocols like Dynamic Source...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Supporting Resourceful and Scalable Multicasting on Cellular Ad Hoc Networks

    Group communications are important in Mobile Ad hoc NETworks (MANET). Multicast is an efficient method for implementing group communications. However, it is challenging to implement efficient and scalable multicast in MANET due to the difficulty in group membership management and multicast packet forwarding over a dynamic topology. The authors propose...

    Provided By IRJCSEA

  • White Papers // Mar 2013

    Efficient Path Selection Metric for Hop-by-Hop Routing in Wireless Mesh Network

    Mesh is a network architecture that providing each node multiple possible connection path ways to every other node. Finding the path with the maximum available bandwidth in Wireless Mesh Network (WMN) is one of the parameter for supporting QoS. Here the authors propose a new routing metric called Efficient Path...

    Provided By IRJCSEA

  • White Papers // Apr 2013

    Malware Classification Through HEX Conversion and Mining

    The malicious codes are normally referred as malware. Systems are vulnerable to the traditional attacks, and attackers continue to find new ways around existing protection mechanisms in order to execute their injected code. Malware is a pervasive problem in distributed computer and network systems. These new malicious executables are created...

    Provided By IRJCSEA

  • White Papers // Apr 2013

    User Profile Base Email Filter for Spam Mail

    E-mail is probably the most convenient method of transferring messages electronically from one person to another, emerging from and going to any part of the world. Important features of E-mail such as its speed, reliability, efficient storage options and a large number of added facilities make it highly popular among...

    Provided By IRJCSEA

  • White Papers // Jan 2013

    New Variant M-Rsa Cryptosystem With One Public Key and Two Private Keys

    In this paper, the authors present the design, develop and analyzed outputs of their threshold public key cryptosystem viz M (Multi Prime)-RSA cryptosystem with one public key and two private keys. They briefly discuss the possibility and validity of combining new variant with algorithm, Java code and test results to...

    Provided By IRJCSEA

  • White Papers // Jan 2013

    Solving Risk-Less, Scalable, and Delicate Data Access Management in Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access Management when users outsource sensitive data for sharing on cloud servers,...

    Provided By IRJCSEA

  • White Papers // Jan 2013

    Congestion Control Mechanism for WCDMA Based Wireless Networks

    WCDMA network is an important air interface technologies for cellular wireless networks. Traditionally in these wireless access networks, the base stations are connected to radio network controller or base station controller by Point to Point links. These Links are expensive and their use imposes and ongoing cost on the service...

    Provided By IRJCSEA

  • White Papers // May 2013

    Adaptive Noise Reduction Techniques for VoIP Networks

    Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users. Among the...

    Provided By IRJCSEA

  • White Papers // Oct 2012

    Determining ABC's of Cloud Computing

    Cloud Computing is an attractive computing model since it allows for resources to be provisioned according on a demand basis, i.e., cloud users can rent resources as they become necessary. Most of these services are available with a standardized access to the business logic through Internet. In today's competitive environment,...

    Provided By IRJCSEA

  • White Papers // Oct 2012

    Cloud Computing in South African SMMEs: Risks and Rewards for Playing at Altitude

    Cloud computing can offer an excellent value proposition to Small, Medium and Micro Enterprises (SMMEs), for whom cash flow, physical IT assets, and human resources are at a premium. However, recent industry surveys among SMMEs are not very conclusive in how its benefits and barriers are perceived and experienced by...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Development and Evaluation of on Demand HRP in MANETS

    In mobile ad hoc networks, there is no centralized infrastructure to monitor or allocate the resources used by the mobile nodes. The absence of any central coordinator makes the routing a complex one compared to cellular networks. The ad hoc on demand Hybrid Routing Protocols (HRP) routing algorithm is a...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    A Priority Dynamic Upstream Bandwidth Allocation Algorithm for QoS Over Ethernet PONs

    Ethernet Passive Optical Networks (EPONs) are envisioned as a promising network technology to provide low cost high-speed solution for end user access to the broadband network. Ethernet is attractive because of the price declines in both fiber optics and Ethernet components. One of the issues that need to be addressed...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    Advancement in Firewalls Using UDP Hole Punching

    Firewalls separate areas of different security requirements. This major task leads to problems regarding the network connectivity and performance of various applications. In particular within distributed systems, like a Grid an unobstructed communication, which is essential for using distributed resources, is not possible. Furthermore Grid applications often use multiple ports...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    Security Issues in Social Networking

    Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner or across the globe. Social networking has transformed the way the connected masses communicate. Social network information is now being used in ways for which it may have not...

    Provided By IRJCSEA

  • White Papers // Nov 2012

    Joint Perfection of Elaboration and Hanging for the Routing in Grouping Networks

    The grouping network structure was proposed in the early 80s and becomes popular nowadays. The routing Elaboration and the routing table size are the two primary performance measures in a dynamic route guidance system. Although various algorithms exist for finding the best routing policy in a Grouping network, hardly exists...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Optimizing Energy and Improving Lifetime of Cluster Based Heterogeneous Protocol in Wireless Sensor Network

    The Wireless Sensor Network(WSN) has become an interesting field of research for gathering data in various situations. It has great potential value in many application areas such as in the military & national defense, environmental monitoring, remote monitoring dangerous areas & soon. Based on network structure, routing protocols in WSNs...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Energy-Efficient Protocol for Coactive Grids

    In Coactive Grids, transmitting and receiving nodes recruit neighboring nodes to assist in communication. The authors model a Coactive transmission link in wireless Grids as a transmitter cluster and a receiver cluster. They then propose a Coactive communication protocol for establishment of these clusters and for Coactive transmission of data....

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Secure Communications Using GDC in Cloud Computing

    Cloud computing has been envisioned as the next generation architecture of IT Enterprise Cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have...

    Provided By IRJCSEA

  • White Papers // Dec 2012

    Location Based Minimal Overhead Shortest Path Routing Protocol in MANET

    A Mobile Ad hoc NETwork (MANET) is one consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. Mobile ad hoc networks are self-organizing and self-configuring multi hop wireless networks where, the structure of the network changes dynamically. Since a destination...

    Provided By IRJCSEA