Jawaharlal Nehru University

Displaying 1-19 of 19 results

  • White Papers // Apr 2013

    Improvement Over DV-Hop Localization Algorithm for Wireless Sensor Networks

    In this paper, the authors propose improved versions of DVHop algorithm as QDV-Hop algorithm and UDV-Hop algorithm for better localization without the need for additional range measurement hardware. The proposed algorithm focuses on third step of DV-Hop, first error terms from estimated distances between unknown node and anchor nodes is...

    Provided By Jawaharlal Nehru University

  • White Papers // Feb 2013

    A Language for Fuzzy Statistical Database

    Fuzzy statistical database is a database used for fuzzy statistical analysis purpose. A fuzzy statistical table is a tabular representation of fuzzy statistics and is a useful data structure for fuzzy statistical database. Primitive fuzzy statistical tables are a building block of fuzzy statistical table. In this paper, the authors...

    Provided By Jawaharlal Nehru University

  • White Papers // Nov 2012

    Automatic Enrichment of Semantic Relation Network to Wordsense Disambiguation in Knowledge Base

    The most fundamental step in Semantic Information Processing (SIP) is to construct Knowledge Base (KB) at the human level; that is to the general understanding and conception of human knowledge. WordNet has been built to be the most systematic and as close to the human level and is being applied...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    A Performance Analysis of LAR Protocol for Vehicular Ad Hoc Networks in City Scenarios

    In this paper, performance analysis of Location Aided Routing (LAR) protocol in different city scenarios has been done. The mobility model considered is manhattan model. This mobility model used to emulate the movement pattern of nodes i.e., vehicles on streets defined by maps. The authors' objective is to provide a...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    Novel Artificial Neural Networks and Logistic Approach for Detecting Credit Card Deceit

    By the rise and rapid growth of E-Commerce, use of credit cards for online purchases has more increased and it caused an explosion in the credit card fraud. The most accepted payment mode is credit card for both online as well as regular purchase, pay bills etc. So frauds associated...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    Misbehaving Users in Anonymizing Networks Using Blocking

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    Firewall's Efficiency Algorithm on Packet Matching Approach

    Since firewalls need to filter all the traffic crossing the network perimeter, they should be able to sustain a very high throughput, or risk becoming a bottleneck. Firewall packet matching can be viewed as a point location problem: each packet (point) has 5 fields (dimensions), which need to be checked...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    An Aggregate Location Monitoring System of Privacy Preserving in Authentication of Wireless Sensor Networks

    Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, the authors propose a privacy-preserving location monitoring System for wireless sensor networks. In their system, they design two in network location anonymization algorithms, namely, resource- and quality-aware algorithms that aim to enable...

    Provided By Jawaharlal Nehru University

  • White Papers // Sep 2012

    An Adaptive Energy Efficient Model for Wireless Ad Hoc Networks

    Several transmit power control MAC protocols have been designed primarily to reduce the energy consumption in wireless ad hoc networks. On the other hand, many adaptive rate MAC protocols have been mainly proposed to improve the network throughput. Recently, very few MAC protocols have been suggested by combining the transmit...

    Provided By Jawaharlal Nehru University

  • White Papers // Aug 2012

    Energy Consumption for Video Transmission in Mobile Ad Hoc Networks

    In the mobile ad hoc network the energy consumed by the transmitter and receiver is more significant due the more energy consumption in the transmitting and receiving of the data. Therefore energy consumption in the devices is needed to optimize. In this paper, the authors analysis the Doppler shift effect...

    Provided By Jawaharlal Nehru University

  • White Papers // Jun 2012

    A Clustering Approach for Task Assignment Problem

    The problem of task assignment in heterogeneous computing system has been studied for many years with many versions. The authors consider the problem in which tasks are to be assigned to homogeneous and heterogeneous machines to minimize the sum of the total computation and communication costs. In this paper, they...

    Provided By Jawaharlal Nehru University

  • White Papers // Dec 2011

    Z-MAC AN ANALYTICAL MODEL FOR WIRELESS SENSOR NETWORKS

    This paper presents an analytical model for estimating throughput and energy consumption in Z-MAC protocol for Wireless Sensor Networks. The analytical design includes transmission power control and transmission of frames through one hop, two hop and multi hop. Proposed model reduces collision under low contention level as well as high...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2011

    An Analytical Analysis of Neighbour and Isolated Node for Geocast Routing in VANET

    Geocasting is a special variant of multicasting, where data packet or message is transmitted to a predefined geographical location i.e., known as geocast region. The applications of geocasting in VANET are to disseminate information like, collision warning, advertising, alerts message, etc. The topology of VANET changes frequently and rapidly due...

    Provided By Jawaharlal Nehru University

  • White Papers // Jun 2011

    Comparison and Analysis of Greedy Forwarding Using Bngf Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a most popular application of Mobile Ad hoc NETworks (MANETs). A lot of research work around the world is being conducted to design an efficient routing protocol for VANETs. In this paper, the authors examine the significance of Greedy Forwarding with Border Node...

    Provided By Jawaharlal Nehru University

  • White Papers // Feb 2011

    Throughput Analysis of Receiver Initiated Collision Avoidance in Multi Hop Wireless Networks

    In this paper, a model has been proposed to compute the saturation throughput of receiver initiated protocols based upon RTR-DATA-ACK handshake in multi hop ad hoc networks. The results indicate that the performance of receiver-initiated collision avoidance is much better than the sender-initiated collision avoidance. The saturated throughput is being...

    Provided By Jawaharlal Nehru University

  • White Papers // Jan 2011

    Improved Power Control MAC Protocol for Wireless Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are multi-hop networks in which mobile nodes operate in a distributed manner without help of any central infrastructure. IEEE 802.11 provides Distributed Coordination Function (DCF) to manage concurrent transmissions and channel contentions. IEEE 802.11 exchanges RTS and CTS messages to avoid the well-known hidden terminal...

    Provided By Jawaharlal Nehru University

  • White Papers // Aug 2010

    FDI, Technology Transfer And Spillover - A Case Study Of India

    As developing countries increasingly open their economies to Foreign Direct Investment (FDI), one of their principal objectives has been to achieve technology transfer from foreign firms to host country firms. This paper for India shows that this technology transfer is more likely to be achieved by the presence of foreign...

    Provided By Jawaharlal Nehru University

  • White Papers // Nov 2009

    Thesaurus and Query Expansion

    The explosive growth of the World Wide Web is making it difficult for a user to locate information that is relevant to his/her interest. Though existing search engines work well to a certain extent but they still face problems like word mismatch which arises because the majority of information retrieval...

    Provided By Jawaharlal Nehru University

  • White Papers // Jan 2009

    India's Stance At The WTO: Shifting Coordinates, Unaltered Paradigm

    India's stance at the WTO has undergone a sea change since the beginning of the Uruguay Round. This paper attempts to trace the shifting coordinates of India's position at the WTO. By focusing on three specific areas of negotiations, namely agriculture, services and TRIPS, the paper presents a theoretical analysis...

    Provided By Jawaharlal Nehru University

  • White Papers // Nov 2012

    Automatic Enrichment of Semantic Relation Network to Wordsense Disambiguation in Knowledge Base

    The most fundamental step in Semantic Information Processing (SIP) is to construct Knowledge Base (KB) at the human level; that is to the general understanding and conception of human knowledge. WordNet has been built to be the most systematic and as close to the human level and is being applied...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    Novel Artificial Neural Networks and Logistic Approach for Detecting Credit Card Deceit

    By the rise and rapid growth of E-Commerce, use of credit cards for online purchases has more increased and it caused an explosion in the credit card fraud. The most accepted payment mode is credit card for both online as well as regular purchase, pay bills etc. So frauds associated...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    Misbehaving Users in Anonymizing Networks Using Blocking

    Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular Web sites....

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    Firewall's Efficiency Algorithm on Packet Matching Approach

    Since firewalls need to filter all the traffic crossing the network perimeter, they should be able to sustain a very high throughput, or risk becoming a bottleneck. Firewall packet matching can be viewed as a point location problem: each packet (point) has 5 fields (dimensions), which need to be checked...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    An Aggregate Location Monitoring System of Privacy Preserving in Authentication of Wireless Sensor Networks

    Monitoring personal locations with a potentially untrusted server poses privacy threats to the monitored individuals. To this end, the authors propose a privacy-preserving location monitoring System for wireless sensor networks. In their system, they design two in network location anonymization algorithms, namely, resource- and quality-aware algorithms that aim to enable...

    Provided By Jawaharlal Nehru University

  • White Papers // Sep 2012

    An Adaptive Energy Efficient Model for Wireless Ad Hoc Networks

    Several transmit power control MAC protocols have been designed primarily to reduce the energy consumption in wireless ad hoc networks. On the other hand, many adaptive rate MAC protocols have been mainly proposed to improve the network throughput. Recently, very few MAC protocols have been suggested by combining the transmit...

    Provided By Jawaharlal Nehru University

  • White Papers // Jan 2011

    Improved Power Control MAC Protocol for Wireless Ad Hoc Networks

    Mobile Ad hoc NETworks (MANETs) are multi-hop networks in which mobile nodes operate in a distributed manner without help of any central infrastructure. IEEE 802.11 provides Distributed Coordination Function (DCF) to manage concurrent transmissions and channel contentions. IEEE 802.11 exchanges RTS and CTS messages to avoid the well-known hidden terminal...

    Provided By Jawaharlal Nehru University

  • White Papers // Feb 2013

    A Language for Fuzzy Statistical Database

    Fuzzy statistical database is a database used for fuzzy statistical analysis purpose. A fuzzy statistical table is a tabular representation of fuzzy statistics and is a useful data structure for fuzzy statistical database. Primitive fuzzy statistical tables are a building block of fuzzy statistical table. In this paper, the authors...

    Provided By Jawaharlal Nehru University

  • White Papers // Aug 2012

    Energy Consumption for Video Transmission in Mobile Ad Hoc Networks

    In the mobile ad hoc network the energy consumed by the transmitter and receiver is more significant due the more energy consumption in the transmitting and receiving of the data. Therefore energy consumption in the devices is needed to optimize. In this paper, the authors analysis the Doppler shift effect...

    Provided By Jawaharlal Nehru University

  • White Papers // Jun 2012

    A Clustering Approach for Task Assignment Problem

    The problem of task assignment in heterogeneous computing system has been studied for many years with many versions. The authors consider the problem in which tasks are to be assigned to homogeneous and heterogeneous machines to minimize the sum of the total computation and communication costs. In this paper, they...

    Provided By Jawaharlal Nehru University

  • White Papers // Apr 2013

    Improvement Over DV-Hop Localization Algorithm for Wireless Sensor Networks

    In this paper, the authors propose improved versions of DVHop algorithm as QDV-Hop algorithm and UDV-Hop algorithm for better localization without the need for additional range measurement hardware. The proposed algorithm focuses on third step of DV-Hop, first error terms from estimated distances between unknown node and anchor nodes is...

    Provided By Jawaharlal Nehru University

  • White Papers // Jan 2009

    India's Stance At The WTO: Shifting Coordinates, Unaltered Paradigm

    India's stance at the WTO has undergone a sea change since the beginning of the Uruguay Round. This paper attempts to trace the shifting coordinates of India's position at the WTO. By focusing on three specific areas of negotiations, namely agriculture, services and TRIPS, the paper presents a theoretical analysis...

    Provided By Jawaharlal Nehru University

  • White Papers // Nov 2009

    Thesaurus and Query Expansion

    The explosive growth of the World Wide Web is making it difficult for a user to locate information that is relevant to his/her interest. Though existing search engines work well to a certain extent but they still face problems like word mismatch which arises because the majority of information retrieval...

    Provided By Jawaharlal Nehru University

  • White Papers // Aug 2010

    FDI, Technology Transfer And Spillover - A Case Study Of India

    As developing countries increasingly open their economies to Foreign Direct Investment (FDI), one of their principal objectives has been to achieve technology transfer from foreign firms to host country firms. This paper for India shows that this technology transfer is more likely to be achieved by the presence of foreign...

    Provided By Jawaharlal Nehru University

  • White Papers // Feb 2011

    Throughput Analysis of Receiver Initiated Collision Avoidance in Multi Hop Wireless Networks

    In this paper, a model has been proposed to compute the saturation throughput of receiver initiated protocols based upon RTR-DATA-ACK handshake in multi hop ad hoc networks. The results indicate that the performance of receiver-initiated collision avoidance is much better than the sender-initiated collision avoidance. The saturated throughput is being...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2011

    An Analytical Analysis of Neighbour and Isolated Node for Geocast Routing in VANET

    Geocasting is a special variant of multicasting, where data packet or message is transmitted to a predefined geographical location i.e., known as geocast region. The applications of geocasting in VANET are to disseminate information like, collision warning, advertising, alerts message, etc. The topology of VANET changes frequently and rapidly due...

    Provided By Jawaharlal Nehru University

  • White Papers // Jun 2011

    Comparison and Analysis of Greedy Forwarding Using Bngf Method in Different Vehicular Traffic Scenarios

    A Vehicular Ad hoc NETwork (VANET) is a most popular application of Mobile Ad hoc NETworks (MANETs). A lot of research work around the world is being conducted to design an efficient routing protocol for VANETs. In this paper, the authors examine the significance of Greedy Forwarding with Border Node...

    Provided By Jawaharlal Nehru University

  • White Papers // Dec 2011

    Z-MAC AN ANALYTICAL MODEL FOR WIRELESS SENSOR NETWORKS

    This paper presents an analytical model for estimating throughput and energy consumption in Z-MAC protocol for Wireless Sensor Networks. The analytical design includes transmission power control and transmission of frames through one hop, two hop and multi hop. Proposed model reduces collision under low contention level as well as high...

    Provided By Jawaharlal Nehru University

  • White Papers // Oct 2012

    A Performance Analysis of LAR Protocol for Vehicular Ad Hoc Networks in City Scenarios

    In this paper, performance analysis of Location Aided Routing (LAR) protocol in different city scenarios has been done. The mobility model considered is manhattan model. This mobility model used to emulate the movement pattern of nodes i.e., vehicles on streets defined by maps. The authors' objective is to provide a...

    Provided By Jawaharlal Nehru University