Jadavpur University

Displaying 1-40 of 71 results

  • White Papers // Mar 2013

    Cloud Computing: Business Edge

    Cloud computing comes into focus only when the users think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay per use service that, in...

    Provided By Jadavpur University

  • White Papers // Feb 2013

    Multilevel Address Reorganization Type2 in Wireless Personal Area Network

    The Standard for Wireless Personal Area Network (WPAN) has been given by IEEE 802.15.4-2003 these networks are consists of Low rate, Low powered, Low memory devices. ZigBee Alliance has provided Network layer specification and PHYsical layer (PHY) and Medium Access Control (MAC) specification has been given by IEEE. In general...

    Provided By Jadavpur University

  • White Papers // Jan 2013

    Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers

    The ease of programming offered by the CUDA programming model attracted a lot of programmers to try the platform for acceleration of many non-graphics applications. Cryptography, being no exception, also found its share of exploration efforts, especially block ciphers. In this paper the authors present a detailed walk-through of effective...

    Provided By Jadavpur University

  • White Papers // Oct 2012

    Stabilization Based Networked Predictive Controller Design for Switched Plants

    Stabilizing state feedback controller has been designed in this paper for a switched DC motor plant, controlled over communication network. The switched system formulation for the Networked Control System (NCS) with additional switching in a plant parameter along with the switching due to random packet losses, have been formulated as...

    Provided By Jadavpur University

  • White Papers // Oct 2012

    Effective Resources Use for Virtual Laboratories Through Cloud Computing Ans Services

    This paper analyzes the opportunities for implementing cloud computing and services for building virtual laboratories. In \"Cloud computing and services\" the authors have covered some basic concepts, their application in various fields and their role in the process of conducting exercises with the virtual labs. In \"Building virtual lab with...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    Energy Aware Algorithm for Clustering in Wireless Network

    In numerous applications, self-organizing property of Wireless Sensor Networks (WSN) is an important characteristic. It calls for decompositions of the network into clusters of desirable bound. Cluster based WSN can enhance the whole networks lifetime. In every cluster, the Cluster Head (CH) plays an important role in aggregating and forwarding...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    A New Data Storage Security Paradigm for Cloud Computing Using TPA

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end recipients. Cloud Computing is the long vision of computing as a utility, in this users can remotely store their data into the cloud, as to acquire the high quality services...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    A Novel Integrated AHP-QFD Model for Software Project Selection under Fuzziness

    Now-a-days software manufacturing companies usually try to capture market share with rapid software development. Actually the development of high quality software products can decrease cost by reducing rework and increasing productivity. For that, reason selection of software projects is an important task. Several factors come into consideration while selection of...

    Provided By Jadavpur University

  • White Papers // Aug 2012

    A Hybrid Architecture to Overcome the Error Propagation Effect of AES

    In the recent past, AES (Advanced Encryption Standard) has been developed to replace DES (Data Encryption Standard) due to several reports of failure of security or key of DES. The replacement has aimed to augment the level of security mainly with the higher key size. Besides the higher level of...

    Provided By Jadavpur University

  • White Papers // Jun 2012

    A New Channel Borrowing Database Algorithm in Multimedia LEO Satellite Communications

    LEO satellite networks are going to play an indispensable role in the development of ubiquitous broadband multimedia systems because of their some attracting characteristics such as low power dissipation, low propagation delay and more efficient spectrum allocation due to frequency reuse between satellites and spotbeams. So they are considered to...

    Provided By Jadavpur University

  • White Papers // Jun 2012

    Prospects of Cloud Computing Over Other Related Technologies

    Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. Cloud Computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage, how and when different resources are allocated to the requested users. In this paper, the...

    Provided By Jadavpur University

  • White Papers // Apr 2012

    Designing an Energy Efficient Framework for Data Gathering in Wireless Sensor Network

    Wireless Sensor Network (WSN) is a collection of nodes which can communicate with each other without any prior infrastructure along with the ability to collect data autonomously and effectively after being deployed in an ad-hoc fashion to monitor a given area. One major problem encountered in data gathering wireless systems...

    Provided By Jadavpur University

  • White Papers // Apr 2012

    Multisource Adaptive Data Distribution and Routing in Wireless Sensor Networks

    The wireless sensor network is a collection of energy-constrained nodes. Their objective is to sense, collect and process information for some ad-hoc purpose. Typically the nodes are deployed in geographically inaccessible regions. Thus the most challenging task is to design a network with minimal power consumption. As the nodes have...

    Provided By Jadavpur University

  • White Papers // Apr 2012

    Adaptive Framework for Data Distribution in Wireless Sensor Networks

    In recent years, the Wireless Sensor Network (WSN) is playing a key role in sensing, collecting and disseminating information in various applications. An important feature associated with WSN is to develop an efficient data distribution and routing scheme to ensure better Quality of Service (QoS) that reduces the power consumption...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    A Noble Indirect Trust Based Link State Routing Scheme Using a Robust Route Trust Method for Wireless Sensor Networks

    Integration of trust in routing mechanisms already prevalent in Wireless Sensor Networks (WSN) has become an interesting research area of late. Several methods exist for the assignment of trust to the nodes present in a WSN. However the real challenge lies in proper integration of this trust to an existing...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    An Optimal Sensor Deployment Scheme to Ensure Multi Level Coverage and Connectivity in Wireless Sensor Networks

    This paper introduces an optimal deployment algorithm of sensors in a given region to provide desired coverage and connectivity for a wireless sensor network. The authors' paper utilizes two separate procedures for covering different regions of a symmetrical rectangular area. The proposed method divides the given area of interest into...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Analysis of AD HOC Network and Mobile Agent Using Threshold Cryptography

    In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Secure Scheme of Data Protection in Cloud Computing

    Cloud Computing is the sum of SaaS and Utility Computing. This paradigm also brings forth many new challenges for data security and access control mechanisms, when users outsource sensitive data for sharing on Cloud systems, which are not within the same trusted domain as data owners. Storing data on untrusted...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Cloud Computing: The Next Generation of the Internet

    This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing and outlines cloud architecture and its major components. Readers will discover how a business can use cloud computing to foster innovation and reduce IT...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Cloud Computing With Service Oriented Architecture in Business Applications

    Cloud Computing and Service Oriented Architecture are the buzzwords of industry. Now-a-days software industries are facing tremendous competition when customer demands change, market demand change, new technology change, business partner change, technologies change, requirements change, interpretations often inaccurate or change, lengthy development cycles impervious to change and to meet all...

    Provided By Jadavpur University

  • White Papers // Feb 2012

    A Simple Flood Forecasting Scheme Using Wireless Sensor Networks

    This paper presents a forecasting model designed using WSNs (Wireless Sensor Networks) to predict flood in rivers using simple and fast calculations to provide real-time results and save the lives of people who may be affected by the flood. The authors' prediction model uses multiple variable robust linear regression which...

    Provided By Jadavpur University

  • White Papers // Feb 2012

    Cross Layer QoS Support Architecture With Integrated CAC and Scheduling Algorithms for WiMAX BWA Networks

    In this paper, a new technique for cross layer design, based on present Eb/N0 (bit energy per noise density) ratio of the connections and target values of the Quality of Service (QoS) information parameters from MAC layer, is proposed to dynamically select the Modulation and Coding Scheme (MCS) at the...

    Provided By Jadavpur University

  • White Papers // Jan 2012

    Framework on Service Based Resource Selection in Cloud Computing

    In this paper, the authors are going to propose service based resource selection method in cloud computing environment. End-user generates a service request that is going to select a service based resource. The proposed mechanism enables users to access resources depending on the predefined criteria. Selection method to access the...

    Provided By Jadavpur University

  • White Papers // Nov 2011

    Security Enhanced Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Networks

    Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key PreDistribution (KPD) which involves preloading keys in sensor nodes, has been considered as the best solution for key management when sensor nodes are battery...

    Provided By Jadavpur University

  • White Papers // Nov 2011

    Securing Mobile Agents in MANET Against Attacks Using Trust

    The emerging trend of using mobile agents for Mobile Adhoc NETwork (MANET) applications intensifies the need for protecting them. Here the authors propose a distributed trust based framework to protect both the agents and the host platforms (running at the nodes) especially against threats of the underlying environment where agents...

    Provided By Jadavpur University

  • White Papers // Sep 2011

    Assured Full Communication by Merging Blocksrandomly in Wireless Sensor Networks Usingreed Solomon Code for Key Predistribution

    Limited resources available to the sensors (nodes) constituting a Wireless Sensor Network (WSN) is major constraint while dealing with security of such networks. This restrict one to use symmetric key cryptography instead of public-key techniques for transmission of message amongst the nodes. In any symmetric key system, both the sender...

    Provided By Jadavpur University

  • White Papers // Sep 2011

    Highly Secure Key Predistribution Using Affine Planes and Reed Muller Codes in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) consist of low powered and resource constrained sensor nodes which are left unattended for long duration of time. Hence it is very challenging to design and implement cost effective security protocols for such networks. Thus symmetric key cryptographic techniques are preferred over public key techniques for...

    Provided By Jadavpur University

  • White Papers // Aug 2011

    Fidelity Based On Demand Secure(FBOD) Routing in Mobile Adhoc Network

    In Mobile Ad-hoc NETwork (MANET), secure routing is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. Many mobile ad-hoc network routing schemes have been proposed, but none of them have been designed with security as a goal. They propose security goals for routing...

    Provided By Jadavpur University

  • White Papers // Jul 2011

    Fading Analysis of MIMO Based Mobile Adhoc Networks

    MIMO technologies are beneficial for Mobile ad-hoc networks by providing the diversity and capacity advantage as well as spatial degree of freedom in designing MAC protocol. The integration of MIMO technology in the area of mobile ad-hoc network has great attenuation in commercial and military application. Most important event in...

    Provided By Jadavpur University

  • White Papers // May 2011

    Minimization of Handoff Latency by Vector Analysis Method

    Due to rapid growth in IEEE 802.11 based Wireless Local Area Networks(WLAN), handoff has become a burning issue. A Mobile Station (MS) requires handoff when it travels out of the coverage area of its current Access Point (AP) and tries to associate with another AP. But handoff delays provide a...

    Provided By Jadavpur University

  • White Papers // May 2011

    Visual Cryptography Scheme for Color Image Using Random Number With Enveloping by Digital Watermarking

    Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). This cryptographic system encrypts the secret image by dividing it into n number of shares and decryption is done by superimposing a certain number of shares (k)...

    Provided By Jadavpur University

  • White Papers // Apr 2011

    Multibiometrics Feature Level Fusion by Graph Clustering

    This paper presents a feature level fusion approach which uses the improved K-medoids clustering algorithm and isomorphic graph for face and palmprint biometrics. Partitioning Around Medoids (PAM) algorithm is used to partition the set of n invariant feature points of the face and palmprint images into k clusters. By partitioning...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Segmentation of Camera Captured Business Card Images for Mobile Devices

    Due to huge deformation in the camera captured images, variety in nature of the business cards and the computational constraints of the mobile devices, design of an efficient Business Card Reader (BCR) is challenging to the researchers. Extraction of text regions and segmenting them into characters is one of such...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Spread Spectrum Image Watermarking for Secured Multimedia Data Communication

    Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Detecting Malicious Dropping Attack in the Internet

    The current interdomain routing protocol, Border Gateway Protocol (BGP) is limited in implementations of universal security. Because of this, it is vulnerable to many attacks at the AS to AS routing infrastructure. Initially, the major concern about BGP security is that malicious BGP routers can arbitrarily falsify BGP routing messages...

    Provided By Jadavpur University

  • White Papers // Nov 2010

    A Key Re-Distribution and Authentication Based Technique for Secured Communication in Clustered Wireless Sensor Networks With Node Mobility

    Due to application of WSN in mission critical areas, secured message communication is very important. The authors have attempted to present a methodology that ensures secured communication among nodes in a hierarchical Cluster Based WSN. The scheme works when member sensor nodes move from one Cluster Head (CH) to another....

    Provided By Jadavpur University

  • White Papers // Nov 2010

    Optimal Placement of Readers in an RFID Network Using Particle Swarm Optimization

    An RFID network consists of a set of tags and readers. The cost and the number of tags covered directly depend on the number of readers. So, finding optimal number of readers and their positions to cover all tags is one of the most important issues in an RFID network....

    Provided By Jadavpur University

  • White Papers // Nov 2010

    VOIP Performance Over Broadband Wireless Networks Under Static and Mobile Environments

    Voice over IP is expected to be very promising application in the next generation communication networks. The objective of this paper is to analyse the VoIP performance among the most competing next generation wireless networks like WiMAX, WLAN and its integrated frameworks etc. WiMAX having higher bandwidth provides higher capacity...

    Provided By Jadavpur University

  • White Papers // Oct 2010

    Simulation Based Analysis of Mobile Sink Speed in Wireless Sensor Networks

    Wireless sensor networks have become a hot research theme in academia and as well as in industry in recent years due to its wide range of applications ranging from medical research to military. The IEEE 802.15.4 is the standard adopted for wireless sensor network platform. In this paper, the authors...

    Provided By Jadavpur University

  • White Papers // Oct 2010

    Energy Efficient Routing in Wireless Sensor Networks: A Genetic Approach

    The key parameters that need to be addressed while designing protocols for sensor networks are its energy awareness and computational feasibility in resource constrained sensor nodes. Variation in the distances of nodes from the Base Station and differences in inter-nodal distances are primary factors causing unequal energy dissipation among the...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    Energy Aware Algorithm for Clustering in Wireless Network

    In numerous applications, self-organizing property of Wireless Sensor Networks (WSN) is an important characteristic. It calls for decompositions of the network into clusters of desirable bound. Cluster based WSN can enhance the whole networks lifetime. In every cluster, the Cluster Head (CH) plays an important role in aggregating and forwarding...

    Provided By Jadavpur University

  • White Papers // Aug 2012

    A Hybrid Architecture to Overcome the Error Propagation Effect of AES

    In the recent past, AES (Advanced Encryption Standard) has been developed to replace DES (Data Encryption Standard) due to several reports of failure of security or key of DES. The replacement has aimed to augment the level of security mainly with the higher key size. Besides the higher level of...

    Provided By Jadavpur University

  • White Papers // Jun 2012

    A New Channel Borrowing Database Algorithm in Multimedia LEO Satellite Communications

    LEO satellite networks are going to play an indispensable role in the development of ubiquitous broadband multimedia systems because of their some attracting characteristics such as low power dissipation, low propagation delay and more efficient spectrum allocation due to frequency reuse between satellites and spotbeams. So they are considered to...

    Provided By Jadavpur University

  • White Papers // Sep 2010

    A Hypothesis Test Based Robust Technique for Video Sequence Matching

    Video sequence matching is the most crucial step to verify whether a video sequence has been copied from another or not. The video sequence in question is represented by a set of visual descriptors. Based on such descriptors the sequence has to be matched with the sequences present in the...

    Provided By Jadavpur University

  • White Papers // Apr 2010

    Artificial Intelligence Based Authentication Technique With Three Entities in 3-G Mobile Communications

    Voice frequency pattern is asymmetric just like nature. Although voice frequency lies between 0-3.5 KHz, a person talking some specific word in different times is always consisting of a very narrow range of frequencies which are varying person to person. Voice frequency of the selective words used by the subscriber...

    Provided By Jadavpur University

  • White Papers // Feb 2013

    Multilevel Address Reorganization Type2 in Wireless Personal Area Network

    The Standard for Wireless Personal Area Network (WPAN) has been given by IEEE 802.15.4-2003 these networks are consists of Low rate, Low powered, Low memory devices. ZigBee Alliance has provided Network layer specification and PHYsical layer (PHY) and Medium Access Control (MAC) specification has been given by IEEE. In general...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Secure Scheme of Data Protection in Cloud Computing

    Cloud Computing is the sum of SaaS and Utility Computing. This paradigm also brings forth many new challenges for data security and access control mechanisms, when users outsource sensitive data for sharing on Cloud systems, which are not within the same trusted domain as data owners. Storing data on untrusted...

    Provided By Jadavpur University

  • White Papers // Jun 2012

    Prospects of Cloud Computing Over Other Related Technologies

    Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. Cloud Computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage, how and when different resources are allocated to the requested users. In this paper, the...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    A New Data Storage Security Paradigm for Cloud Computing Using TPA

    Cloud computing refers to the delivery of computing and storage capacity as a service to a heterogeneous community of end recipients. Cloud Computing is the long vision of computing as a utility, in this users can remotely store their data into the cloud, as to acquire the high quality services...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Cloud Computing: The Next Generation of the Internet

    This paper describes cloud computing, a computing platform for the next generation of the Internet. The paper defines clouds, explains the business benefits of cloud computing and outlines cloud architecture and its major components. Readers will discover how a business can use cloud computing to foster innovation and reduce IT...

    Provided By Jadavpur University

  • White Papers // Mar 2012

    Cloud Computing With Service Oriented Architecture in Business Applications

    Cloud Computing and Service Oriented Architecture are the buzzwords of industry. Now-a-days software industries are facing tremendous competition when customer demands change, market demand change, new technology change, business partner change, technologies change, requirements change, interpretations often inaccurate or change, lengthy development cycles impervious to change and to meet all...

    Provided By Jadavpur University

  • White Papers // Oct 2012

    Effective Resources Use for Virtual Laboratories Through Cloud Computing Ans Services

    This paper analyzes the opportunities for implementing cloud computing and services for building virtual laboratories. In \"Cloud computing and services\" the authors have covered some basic concepts, their application in various fields and their role in the process of conducting exercises with the virtual labs. In \"Building virtual lab with...

    Provided By Jadavpur University

  • White Papers // Mar 2013

    Cloud Computing: Business Edge

    Cloud computing comes into focus only when the users think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay per use service that, in...

    Provided By Jadavpur University

  • White Papers // Mar 2010

    Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-based Improved K-Medoids Partitioning

    This paper presents a feature level fusion approach which uses the improved K-medoids clustering algorithm and isomorphic graph for face and palmprint biometrics. Partitioning Around Medoids (PAM) algorithm is used to partition the set of n invariant feature points of the face and palmprint images into k clusters. By partitioning...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Detecting Malicious Dropping Attack in the Internet

    The current interdomain routing protocol, Border Gateway Protocol (BGP) is limited in implementations of universal security. Because of this, it is vulnerable to many attacks at the AS to AS routing infrastructure. Initially, the major concern about BGP security is that malicious BGP routers can arbitrarily falsify BGP routing messages...

    Provided By Jadavpur University

  • White Papers // Jan 2013

    Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers

    The ease of programming offered by the CUDA programming model attracted a lot of programmers to try the platform for acceleration of many non-graphics applications. Cryptography, being no exception, also found its share of exploration efforts, especially block ciphers. In this paper the authors present a detailed walk-through of effective...

    Provided By Jadavpur University

  • White Papers // May 2009

    Multi-Objective Differential Evolution for Automatic Clustering with Application to Micro-Array Data Analysis

    In this paper, the authors apply the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performances of two multi-objective variants of DE over the fuzzy clustering problem, where two conflicting fuzzy validity indices are simultaneously optimized. The resultant...

    Provided By Jadavpur University

  • White Papers // Jan 2010

    Pattern Clustering Using a Swarm Intelligence Approach

    Clustering aims at representing large datasets by a fewer number of prototypes or clusters. It brings simplicity in modeling data and thus plays a central role in the process of knowledge discovery and data mining. Data mining tasks, in these days, require fast and accurate partitioning of huge datasets, which...

    Provided By Jadavpur University

  • White Papers // Mar 2009

    Automatic Clustering Using a Synergy of Genetic Algorithm and Multi-objective Differential Evolution

    In this paper, the authors apply the Differential Evolution (DE) and Genetic Algorithm (GA) to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performance a hybrid of the GA and DE (GADE) algorithms over the fuzzy clustering problem, where two conflicting fuzzy validity...

    Provided By Jadavpur University

  • White Papers // Feb 2009

    Automatic Clustering with Multi-objective Differential Evolution Algorithms

    In this paper, the authors apply the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performances of four recently developed multi-objective variants of DE over the fuzzy clustering problem, where two conflicting fuzzy validity indices are simultaneously optimized....

    Provided By Jadavpur University

  • White Papers // Feb 2009

    A Bacterial Evolutionary Algorithm for Automatic Data Clustering

    In this paper, the authors describe an evolutionary clustering algorithm, which can partition a given dataset automatically into the optimal number of groups through one shot of optimization. The proposed method is based on an evolutionary computing technique known as the Bacterial Evolutionary Algorithm (BEA). The BEA draws inspiration from...

    Provided By Jadavpur University

  • White Papers // Apr 2006

    Document Clustering Using Differential Evolution

    In this paper, the authors investigate a novel approach for partitional clustering of a large collection of text documents by using an improved version of the classical Differential Algorithm (DE). Fast and accurate clustering of documents plays an important role in the field of text mining and automatic information retrieval...

    Provided By Jadavpur University

  • White Papers // Feb 2009

    Energy Efficient Communication Protocol for a Mobile Wireless Sensor Network System

    Wireless Sensor Network Systems can be applied to monitor different environments ranging from military to civil applications. It has been observed that different protocols required for smooth functioning of the network system are highly application specific. Another important fact is that the communication protocols have significant role in achieving right...

    Provided By Jadavpur University

  • White Papers // Jul 2010

    Incorporating QoS Awareness in Routing Metrics for Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) consist of mesh clients that can be either stationary or mobile, and static mesh routers through which the clients communicate with each other and with the Internet or other networks. Wireless mesh networks have established their presence with a promise of supporting variegated traffic ranging from...

    Provided By Jadavpur University

  • White Papers // Dec 2009

    Wireless Sensor Network Security Analysis

    The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges to researchers. These networks are likely to be composed of hundreds, and potentially thousands of tiny sensor nodes, functioning autonomously, and in many cases, without access to renewable energy...

    Provided By Jadavpur University

  • White Papers // Jun 2010

    Minimization of Handoff Failure Probability for Next-Generation Wireless Systems

    During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks. Next-Generation Wireless Systems (NGWS) integrate different wireless systems,...

    Provided By Jadavpur University

  • White Papers // Feb 2010

    A Parallel Framework for Multilayer Perceptron for Human Face Recognition

    Artificial neural networks have already shown their success in face recognition and similar complex pattern recognition tasks. However, a major disadvantage of the technique is that it is extremely slow during training for larger classes and hence not suitable for real-time complex problems such as pattern recognition. This is an...

    Provided By Jadavpur University

  • White Papers // Jun 2010

    Secure Connectivity Model in Wireless Sensor Networks (WSN) Using 1st Order Reed-Muller Codes

    Two of the most popular ad hoc networks are Mobile Ad Hoc NETwork (MANET) and Sensor networks. Here the authors will deal with Wireless Sensor Networks (WSN), where the sensors communicate among themselves using radio frequencies. WSN has several military applications like collection of information about enemy movements, explosions, detecting...

    Provided By Jadavpur University

  • White Papers // Dec 2008

    SVM-Based Multiview Face Recognition by Generalization of Discriminant Analysis

    Identity verification of authentic persons by their multiview faces is a real valued problem in machine vision. Multiview faces are having difficulties due to non-linear representation in the feature space. This paper illustrates the usability of the generalization of LDA in the form of canonical covariate for face recognition to...

    Provided By Jadavpur University

  • White Papers // Mar 2009

    Wi-Fi, WiMax and WCDMA a Comparative Study Based on Channel Impairments and Equalization Method Used

    The use of Vehicle-To-Vehicle (V2V) communication will be an integral part of Intelligent Transport Systems (ITSs), and work on ITS has been growing substantially in recent years. Some obvious benefits of ITS are its ability to improve road safety; weather, making commuters aware of current traffic, and road conditions in...

    Provided By Jadavpur University

  • White Papers // Mar 2009

    MIMO Based Multimedia Communication System

    Communication technology requires being sustainable in the sense of people's satisfaction for high data rate multimedia communication. Communication channel is the main constraint to achieve high speed data communication. The Third-Generation (3G) and Fourth-Generation (4G) mobile communications are expected to provide a high-rate data services beyond 2 Mbps utilizing WCDMA,...

    Provided By Jadavpur University

  • White Papers // Nov 2010

    A Key Re-Distribution and Authentication Based Technique for Secured Communication in Clustered Wireless Sensor Networks With Node Mobility

    Due to application of WSN in mission critical areas, secured message communication is very important. The authors have attempted to present a methodology that ensures secured communication among nodes in a hierarchical Cluster Based WSN. The scheme works when member sensor nodes move from one Cluster Head (CH) to another....

    Provided By Jadavpur University

  • White Papers // Nov 2010

    Optimal Placement of Readers in an RFID Network Using Particle Swarm Optimization

    An RFID network consists of a set of tags and readers. The cost and the number of tags covered directly depend on the number of readers. So, finding optimal number of readers and their positions to cover all tags is one of the most important issues in an RFID network....

    Provided By Jadavpur University

  • White Papers // Jun 2010

    I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet Forwarding Technique for Wireless Sensor and Ad Hoc Networks

    Energy consumption and delay incurred in packet delivery are the two important metrics for measuring the performance of geographic routing protocols for Wireless Adhoc and Sensor Networks (WASN). A protocol capable of ensuring both lesser energy consumption and experiencing lesser delay in packet delivery is thus suitable for networks which...

    Provided By Jadavpur University

  • White Papers // Dec 2009

    Comparison of Performance Metrics for QPSK and OQPSK Transmission Using Root Raised Cosine & Raised Cosine Pulse-Shaping Filters for Applications in Mobile Communication

    Quadrature Phase Shift Keying (QPSK) and Offset Quadrature Phase Shift Keying (OQPSK) are two wellaccepted modulation techniques used in Code Division Multiple Access (CDMA) system. The Pulse-Shaping Filters play an important role in digital transmission. The type of Pulse-Shaping Filter used, and its behavior would influence the performance of the...

    Provided By Jadavpur University

  • White Papers // Sep 2010

    A Fair and Efficient Packet Scheduling Scheme for IEEE 802.16 Broadband Wireless Access Systems

    This paper proposes a fair and efficient QoS scheduling scheme for IEEE 802.16 BWA systems that satisfies both throughput and delay guarantee to various real and non-real time applications. The proposed QoS scheduling scheme is compared with an existing QoS scheduling scheme proposed in literature in recent past. Simulation results...

    Provided By Jadavpur University

  • White Papers // Nov 2010

    VOIP Performance Over Broadband Wireless Networks Under Static and Mobile Environments

    Voice over IP is expected to be very promising application in the next generation communication networks. The objective of this paper is to analyse the VoIP performance among the most competing next generation wireless networks like WiMAX, WLAN and its integrated frameworks etc. WiMAX having higher bandwidth provides higher capacity...

    Provided By Jadavpur University

  • White Papers // Oct 2009

    A Cost Effective RFID Based Customized DVDROM to Thwart Software Piracy

    Over the years, the software industry has developed into a multi-billion dollars business, with it spreading its wings throughout the world. Not only in the commercial field, but softwares are now being applied in almost all spheres of the life. Ranging from defense activities to health monitoring, there are softwares...

    Provided By Jadavpur University

  • White Papers // Jan 2011

    Spread Spectrum Image Watermarking for Secured Multimedia Data Communication

    Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia...

    Provided By Jadavpur University

  • White Papers // Sep 2012

    A Novel Integrated AHP-QFD Model for Software Project Selection under Fuzziness

    Now-a-days software manufacturing companies usually try to capture market share with rapid software development. Actually the development of high quality software products can decrease cost by reducing rework and increasing productivity. For that, reason selection of software projects is an important task. Several factors come into consideration while selection of...

    Provided By Jadavpur University