Jadavpur University

Displaying 1-40 of 66 results

  • White Papers // Mar 2013

    Cloud Computing: Business Edge

    Cloud computing comes into focus only when the users think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay per use service that, in...

    Provided By Jadavpur University

  • White Papers // Feb 2013

    Multilevel Address Reorganization Type2 in Wireless Personal Area Network

    The Standard for Wireless Personal Area Network (WPAN) has been given by IEEE 802.15.4-2003 these networks are consists of Low rate, Low powered, Low memory devices. ZigBee Alliance has provided Network layer specification and PHYsical layer (PHY) and Medium Access Control (MAC) specification has been given by IEEE. In general...

    Provided By Jadavpur University

  • White Papers // Jan 2013

    Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers

    The ease of programming offered by the CUDA programming model attracted a lot of programmers to try the platform for acceleration of many non-graphics applications. Cryptography, being no exception, also found its share of exploration efforts, especially block ciphers. In this paper the authors present a detailed walk-through of effective...

    Provided By Jadavpur University

  • White Papers // Oct 2012

    Stabilization Based Networked Predictive Controller Design for Switched Plants

    Stabilizing state feedback controller has been designed in this paper for a switched DC motor plant, controlled over communication network. The switched system formulation for the Networked Control System (NCS) with additional switching in a plant parameter along with the switching due to random packet losses, have been formulated as...

    Provided By Jadavpur University

  • White Papers // Oct 2012

    Effective Resources Use for Virtual Laboratories Through Cloud Computing Ans Services

    This paper analyzes the opportunities for implementing cloud computing and services for building virtual laboratories. In \"Cloud computing and services\" the authors have covered some basic concepts, their application in various fields and their role in the process of conducting exercises with the virtual labs. In \"Building virtual lab with...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    A Novel Integrated AHP-QFD Model for Software Project Selection under Fuzziness

    Now-a-days software manufacturing companies usually try to capture market share with rapid software development. Actually the development of high quality software products can decrease cost by reducing rework and increasing productivity. For that, reason selection of software projects is an important task. Several factors come into consideration while selection of...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    Energy Aware Algorithm for Clustering in Wireless Network

    In numerous applications, self-organizing property of Wireless Sensor Networks (WSN) is an important characteristic. It calls for decompositions of the network into clusters of desirable bound. Cluster based WSN can enhance the whole networks lifetime. In every cluster, the Cluster Head (CH) plays an important role in aggregating and forwarding...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    A New Data Storage Security Paradigm for Cloud Computing Using TPA

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end recipients. Cloud Computing is the long vision of computing as a utility, in this users can remotely store their data into the cloud, as to acquire the high quality services...

    Provided By Jadavpur University

  • White Papers // Aug 2012

    A Hybrid Architecture to Overcome the Error Propagation Effect of AES

    In the recent past, AES (Advanced Encryption Standard) has been developed to replace DES (Data Encryption Standard) due to several reports of failure of security or key of DES. The replacement has aimed to augment the level of security mainly with the higher key size. Besides the higher level of...

    Provided By Jadavpur University

  • White Papers // Jun 2012

    A New Channel Borrowing Database Algorithm in Multimedia LEO Satellite Communications

    LEO satellite networks are going to play an indispensable role in the development of ubiquitous broadband multimedia systems because of their some attracting characteristics such as low power dissipation, low propagation delay and more efficient spectrum allocation due to frequency reuse between satellites and spotbeams. So they are considered to...

    Provided By Jadavpur University

  • White Papers // Jun 2012

    Prospects of Cloud Computing Over Other Related Technologies

    Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. Cloud Computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage, how and when different resources are allocated to the requested users. In this paper, the...

    Provided By Jadavpur University

  • White Papers // Apr 2012

    Designing an Energy Efficient Framework for Data Gathering in Wireless Sensor Network

    Wireless Sensor Network (WSN) is a collection of nodes which can communicate with each other without any prior infrastructure along with the ability to collect data autonomously and effectively after being deployed in an ad-hoc fashion to monitor a given area. One major problem encountered in data gathering wireless systems...

    Provided By Jadavpur University

  • White Papers // Apr 2012

    Multisource Adaptive Data Distribution and Routing in Wireless Sensor Networks

    The wireless sensor network is a collection of energy-constrained nodes. Their objective is to sense, collect and process information for some ad-hoc purpose. Typically the nodes are deployed in geographically inaccessible regions. Thus the most challenging task is to design a network with minimal power consumption. As the nodes have...

    Provided By Jadavpur University

  • White Papers // Apr 2012

    Adaptive Framework for Data Distribution in Wireless Sensor Networks

    In recent years, the Wireless Sensor Network (WSN) is playing a key role in sensing, collecting and disseminating information in various applications. An important feature associated with WSN is to develop an efficient data distribution and routing scheme to ensure better Quality of Service (QoS) that reduces the power consumption...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    A Noble Indirect Trust Based Link State Routing Scheme Using a Robust Route Trust Method for Wireless Sensor Networks

    Integration of trust in routing mechanisms already prevalent in Wireless Sensor Networks (WSN) has become an interesting research area of late. Several methods exist for the assignment of trust to the nodes present in a WSN. However the real challenge lies in proper integration of this trust to an existing...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    An Optimal Sensor Deployment Scheme to Ensure Multi Level Coverage and Connectivity in Wireless Sensor Networks

    This paper introduces an optimal deployment algorithm of sensors in a given region to provide desired coverage and connectivity for a wireless sensor network. The authors' paper utilizes two separate procedures for covering different regions of a symmetrical rectangular area. The proposed method divides the given area of interest into...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Analysis of AD HOC Network and Mobile Agent Using Threshold Cryptography

    In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Secure Scheme of Data Protection in Cloud Computing

    Cloud Computing is the sum of SaaS and Utility Computing. This paradigm also brings forth many new challenges for data security and access control mechanisms, when users outsource sensitive data for sharing on Cloud systems, which are not within the same trusted domain as data owners. Storing data on untrusted...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Cloud Computing: The Next Generation of the Internet

    This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing and outlines cloud architecture and its major components. Readers will discover how a business can use cloud computing to foster innovation and reduce IT...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Cloud Computing With Service Oriented Architecture in Business Applications

    Cloud Computing and Service Oriented Architecture are the buzzwords of industry. Now-a-days software industries are facing tremendous competition when customer demands change, market demand change, new technology change, business partner change, technologies change, requirements change, interpretations often inaccurate or change, lengthy development cycles impervious to change and to meet all...

    Provided By Jadavpur University

  • White Papers // Feb 2012

    A Simple Flood Forecasting Scheme Using Wireless Sensor Networks

    This paper presents a forecasting model designed using WSNs (Wireless Sensor Networks) to predict flood in rivers using simple and fast calculations to provide real-time results and save the lives of people who may be affected by the flood. The authors' prediction model uses multiple variable robust linear regression which...

    Provided By Jadavpur University

  • White Papers // Feb 2012

    Cross Layer QoS Support Architecture With Integrated CAC and Scheduling Algorithms for WiMAX BWA Networks

    In this paper, a new technique for cross layer design, based on present Eb/N0 (bit energy per noise density) ratio of the connections and target values of the Quality of Service (QoS) information parameters from MAC layer, is proposed to dynamically select the Modulation and Coding Scheme (MCS) at the...

    Provided By Jadavpur University

  • White Papers // Jan 2012

    Framework on Service Based Resource Selection in Cloud Computing

    In this paper, the authors are going to propose service based resource selection method in cloud computing environment. End-user generates a service request that is going to select a service based resource. The proposed mechanism enables users to access resources depending on the predefined criteria. Selection method to access the...

    Provided By Jadavpur University

  • White Papers // Nov 2011

    Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks

    Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key PreDistribution (KPD) which involves preloading keys in sensor nodes, has been considered as the best solution for key management when sensor nodes are battery...

    Provided By Jadavpur University

  • White Papers // Nov 2011

    Securing Mobile Agents in MANET Against Attacks Using Trust

    The emerging trend of using mobile agents for Mobile Adhoc NETwork (MANET) applications intensifies the need for protecting them. Here the authors propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents...

    Provided By Jadavpur University

  • White Papers // Sep 2011

    Assured Full Communication by Merging Blocksrandomly in Wireless Sensor Networks Usingreed Solomon Code for Key Predistribution

    Limited resources available to the sensors (nodes) constituting a Wireless Sensor Network (WSN) is major constraint while dealing with security of such networks. This restrict one to use symmetric key cryptography instead of public-key techniques for transmission of message amongst the nodes. In any symmetric key system, both the sender...

    Provided By Jadavpur University

  • White Papers // Sep 2011

    Highly Secure Key Predistribution Using Affine Planes and Reed Muller Codes in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consist of low powered and resource constrained sensor nodes which are left unattended for long duration of time. Hence it is very challenging to design and implement cost effective security protocols for such networks. Thus symmetric key cryptographic techniques are preferred over public key techniques for...

    Provided By Jadavpur University

  • White Papers // Aug 2011

    Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

    In Mobile Ad-hoc NETwork (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. Many mobile ad-hoc network routing schemes have been proposed, but none of them have been designed with security as a goal. They propose security goals for routing...

    Provided By Jadavpur University

  • White Papers // Jul 2011

    Fading Analysis of MIMO Based Mobile Adhoc Networks

    MIMO technologies are beneficial for Mobile ad-hoc networks by providing the diversity and capacity advantage as well as spatial degree of freedom in designing MAC protocol. The integration of MIMO technology in the area of mobile ad-hoc network has great attenuation in commercial and military application. Most important event in...

    Provided By Jadavpur University

  • White Papers // May 2011

    Minimization of Handoff Latency by Vector Analysis Method

    Due to rapid growth in IEEE 802.11 based Wireless Local Area Networks(WLAN), handoff has become a burning issue. A Mobile Station (MS) requires handoff when it travels out of the coverage area of its current Access Point (AP) and tries to associate with another AP. But handoff delays provide a...

    Provided By Jadavpur University

  • White Papers // May 2011

    Visual Cryptography Scheme for Color Image Using Random Number With Enveloping by Digital Watermarking

    Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). This cryptographic system encrypts the secret image by dividing it into n number of shares and decryption is done by superimposing a certain number of shares (k)...

    Provided By Jadavpur University

  • White Papers // Apr 2011

    Multibiometrics Feature Level Fusion by Graph Clustering

    This paper presents a feature level fusion approach which uses the improved K-medoids clustering algorithm and isomorphic graph for face and palmprint biometrics. Partitioning Around Medoids (PAM) algorithm is used to partition the set of n invariant feature points of the face and palmprint images into k clusters. By partitioning...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Segmentation of Camera Captured Business Card Images for Mobile Devices

    Due to huge deformation in the camera captured images, variety in nature of the business cards and the computational constraints of the mobile devices, design of an efficient Business Card Reader (BCR) is challenging to the researchers. Extraction of text regions and segmenting them into characters is one of such...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Spread Spectrum Image Watermarking for Secured Multimedia Data Communication

    Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Detecting Malicious Dropping Attack in the Internet

    The current interdomain routing protocol, Border Gateway Protocol (BGP) is limited in implementations of universal security. Because of this, it is vulnerable to many attacks at the AS to AS routing infrastructure. Initially, the major concern about BGP security is that malicious BGP routers can arbitrarily falsify BGP routing messages...

    Provided By Jadavpur University

  • White Papers // Nov 2010

    A Key Re-Distribution and Authentication Based Technique for Secured Communication in Clustered Wireless Sensor Networks With Node Mobility

    Due to application of WSN in mission critical areas, secured message communication is very important. The authors have attempted to present a methodology that ensures secured communication among nodes in a hierarchical Cluster Based WSN. The scheme works when member sensor nodes move from one Cluster Head (CH) to another....

    Provided By Jadavpur University

  • White Papers // Nov 2010

    Optimal Placement of Readers in an RFID Network Using Particle Swarm Optimization

    An RFID network consists of a set of tags and readers. The cost and the number of tags covered directly depend on the number of readers. So, finding optimal number of readers and their positions to cover all tags is one of the most important issues in an RFID network....

    Provided By Jadavpur University

  • White Papers // Nov 2010

    VOIP Performance Over Broadband Wireless Networks Under Static and Mobile Environments

    Voice over IP is expected to be very promising application in the next generation communication networks. The objective of this paper is to analyse the VoIP performance among the most competing next generation wireless networks like WiMAX, WLAN and its integrated frameworks etc. WiMAX having higher bandwidth provides higher capacity...

    Provided By Jadavpur University

  • White Papers // Oct 2010

    Simulation Based Analysis of Mobile Sink Speed in Wireless Sensor Networks

    Wireless sensor networks have become a hot research theme in academia and as well as in industry in recent years due to its wide range of applications ranging from medical research to military. The IEEE 802.15.4 is the standard adopted for wireless sensor network platform. In this paper, the authors...

    Provided By Jadavpur University

  • White Papers // Oct 2010

    Energy Efficient Routing in Wireless Sensor Networks: A Genetic Approach

    The key parameters that need to be addressed while designing protocols for sensor networks are its energy awareness and computational feasibility in resource constrained sensor nodes. Variation in the distances of nodes from the Base Station and differences in inter-nodal distances are primary factors causing unequal energy dissipation among the...

    Provided By Jadavpur University