JCAKSRCE

Displaying 1-40 of 99 results

  • White Papers // Mar 2014

    A Novel Approach for Privacy Preserving Multiparty Data Publishing

    Data mining is the technique normally used for extracting the data from large database. Collaborative data publishing is the emerging technique to publish the data in one webpage and provide web service on more than one page with security. Collaborative data publish has the problem for anonymizing horizontally partitioned data...

    Provided By JCAKSRCE

  • White Papers // Sep 2013

    Study of Knowledge Based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environments

    Software as a Service (SaaS) provides access to applications to end users over the Internet without upfront investment in infrastructure and software. To serve their customers, SaaS providers utilize resources of internal data centers or rent resources from a public Infrastructure as a Service (IaaS) provider. In-house hosting can increase...

    Provided By JCAKSRCE

  • White Papers // Apr 2013

    Cloud-Based Image Processing with Data Priority Distribution Mechanism

    Most users process short tasks using MapReduce. In other words, most tasks handled by the map and reduce functions require low response time. Currently, quite few users use MapReduce for 2D to 3D image processing, which is highly complicated and requires long execution time. However, in the author's opinion, MapReduce...

    Provided By JCAKSRCE

  • White Papers // Jan 2013

    Multi Algorithm Approach for Face Recognition Using Average Half Face

    Face recognition has received much attention in recent years due to its many applications such as human computer interface, video surveillance and face image database management. It is a challenging technique due to under different lighting conditions, facial expressions and changes in head pose. Single class of feature is not...

    Provided By JCAKSRCE

  • White Papers // Jan 2013

    A Survey to Analysis of Topological Relational Ranked Clusters for Spatial and Temporal Data

    Data mining is the process of discovering interesting and useful patterns of information embedded in large databases. Data clustering is a very important technique for exploratory information analysis in data mining and has been the main target of considerable research in many domains for many years. Clustering may be a...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Energy-Efficient Protocol for Wireless Sensor Networks

    The power consumption of nodes determines the lifetime of the wireless sensor network. Thus, the design of low-power node is very important. The sensors sense physical phenomena in different ways, designing and testing a different coverage protocol for each sensing model is indeed a costly task. To address these challenging...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    The Performance Comparison of an AODV, DSR, DSDV and OLSR Routing Protocols in Mobile Ad-Hoc Networks

    Wireless networking is an emerging technology that allows users to access information and services electronically, regardless of their geographic position. Wireless networks can be infrastructure networks or infra structure less (Ad-hoc) networks. An ad-hoc network is a collection of mobile nodes which forms a temporary network without the aid of...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Evaluation and Delay of the Routing Protocols in Ad-Hoc Wireless Networks

    A wireless ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Matrix Hop Mobile Agent (MHMA) - A Novel Framework for Security Architecture

    Mobile agent technology is a new computing paradigm appropriate for distributed computing environment. To eliminate various security issues and its corresponding solutions available in existing mobile agent systems like free roaming mobile agent, an alternative model has been developed called as MHMA (Matrix Hop Mobile System) system. In MHMA, the...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    A Systematic Review of Reusability Assessment Model and Related Approach for Reusable Component Mining

    Promoting reuse at sophisticated levels is becoming an increasingly important part. Software reuse is the process of reusing the existing software components from the system rather than developing the components newly. As software re-user's include the reusable software components to improve the productivity and quality in their product, they must...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    Comparative Analysis and Inferences for Enhancement of Cognitive Radio Networks

    Cognitive Radio Network opportunistically exploits locally unused spectrum which is not heavily occupied by licensed users. It provides a new path to resolve spectral scarcity and to avoid spectral congestion, without disturbing the QoS requirements of others in the system. Of the many challenges involved in the practical ways of...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    Dropping of Call Due to Congestion in Mobile Network

    A Mobile network can be defined as the group of multiple nodes like MS, BTS/Node B, BSC/RNC, MSS, HLR, etc. These nodes architecture are vendor dependent but in general it consist specific hardware & software. Software is application specific & vendor proprietary. Nokia Siemens Network, Ericsson, Huawei are major manufacturer...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    The Adaptation of SC-FDMA in the Uplink Gives Edge to LTE Over WiMAX2 in Ad-Hoc Network

    Relay technologies have been actively studied and considered in the standardization process of next-generation mobile broadband communication systems such as 3GPP LTE-Advanced, IEEE 802.16j, and IEEE 802.16m. This paper first introduces and compares different relay types in LTE-Advanced and WiMAX standards. Simulation results show that relay technologies can effectively improve...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    A Comparative Study on the Topology Control Mechanism Using GAHCT and FLHCT for an N-Tier Heterogeneous Wireless Sensor Network

    Topology control targets to achieve an energy efficient network with limited number of communication links between the sensor nodes. One way to attain a reduced topology is via a cooperative technique. In this paper, a new methodology GAHCT: Genetic Algorithm based Hierarchical Cooperative Technique is proposed and implemented for a...

    Provided By JCAKSRCE

  • White Papers // Mar 2012

    Reduce Delays in End to End DVB-RCS Satellite Networks

    In today's satellite network to a return-channel for communication between terminals used in the DVB-RCS standard is provided by this feature. In order to allocate the bandwidth of the standard protocol used is called DAMA where algorithms such as CRA, RBDC uses to request bandwidth Since these methods are simple...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    FPGA Implementation of High Performance Face Detection Using MCT and Adaboost Algorithm

    In this paper, the proposed novel architecture and FPGA implementation is for high performance real time face detection engine for various illuminations in mobile applications. MCT (Modified Census Transform) and adaboost algorithms are the basic algorithms used for face detection engine. The hardware architecture of face detection engine is for...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Design of Error Correction and Allusion in Turbo Decoder for Wireless Application

    Wireless Sensor Network (WSN) consists of limited energy resources, which reduce the processing capabilities and a radio frequency communication unit with limited transmission power. In wireless communication, Automatic Repeat reQuest (ARQ) technique are used which has power loss in packet retransmission. Then Error Correcting Code (ECC) can be used to...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Autonomously Reconfiguring Failures in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications They have also been evolving in various forms to meet the increasing capacity demands. However during their lifetime, multi hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Encrypted-Data Routing Protocol for Wireless Sensor Networks

    In sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a typical deployment of large number of sensor nodes have posed many challenges to the design and management of sensor networks. These challenges...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Data Delivery in Wireless Sensor Network Using Collaborative Randomized Dispersive Routes

    In wireless sensor networks (WSNs) Compromised-node and denial-of-service are two key attacks that create the black hole in the network. In existing classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. Once the adversary acquires the routing algorithm, it can compute the same routes...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Green Networking

    Green networking refers to the practice of using networking resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Energy Based Multipath Routing Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consists of small nodes with sensing, computation, wireless communications capabilities have led to many new routing protocols specifically designed for sensor networks and enabling real time applications in wireless sensor networks. Wireless sensor networks demands certain delay sensitive, bandwidth requirements and reliability, energy efficient not only...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Exploiting Resource Overloading Using Utility Accrual Approach for Parallel Data Processing in Cloud

    Parallel Data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. One of an IaaS cloud's key feature is the provisioning of compute resources on demand. The computer resources available in the cloud are highly dynamic and possibly heterogeneous. Nephele is the first data processing...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Route Diversity Based Optimal Path Selection Using Random Key Generation

    A network programming protocols provide an efficient way to update program images running on sensor nodes without having physical access to them. Securing these updates, however, remains a challenging and important issue, given the open environment where sensor nodes are often deployed. Several approaches addressing these issues have been reported,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Efficient Ranking on Road Network by Quality Preferences

    A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood. For example, consider a road network database with available paths for two points. A customer may want to rank the paths with respect to their distance defined after aggregating the qualities of other features...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Automatised Toll Gate System Using Passive RFID and GSM Technology

    Automatised toll gate system using passive Radio Frequency Identification emerges as a converging technology where time and efficiency are the matter of priority in toll collection systems of present day. In order to overcome the major issue of collision, in the authors' project the reader is placed in a strip...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Reliable Determination of Zombies Based on Entropy Variation

    A zombie is a computer, connected to the internet that has been compromised by a cracker. Zombie computers are often used to launch distributed denial-of-service attacks. Distributed denial-of-service (ddos) attacks are a critical threat to the internet. However, the memoryless feature of the internet routing mechanisms makes it extremely hard...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Survey of ARToolkitBased Augmented Reality Applications

    Augumented Reality is a budding area in virtual reality research, which tends to present a combination of real and virtual image to the user. This paper briefs a short survey on Augmented Reality applications that uses ARToolkit. Augmented Reality is one of the research hotspots of many renowned foreign universities...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Development of Fuzzy Based Detection of Link Failure in Overlay Network

    Performance of overlay networks can be improved if proper detection of link failures is done and deployment of overlay nodes in exact locations are done. The major factors that result in link failure are loss of signals, loss of synchronization, link capacity and faulty interfaces. Though extensive research is carried...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Performance Analysis of an Adaptive Mechanism for Access Control in Vehicular Ad Hoc Networks

    Vanets have the ability to transmit various types of information between a vehicle and another, or between a vehicle and a fixed station. However, transmission may be impaired due to long delays, quantity of collisions and signal noise. This is caused, in part, by abrupt changes in the network topology....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Adaptive Sampling Approach for Energy Conservation in WSN Using Embedded System

    Energy conservation methods for wireless sensor networks generally assume that data acquirement and processing have energy utilization that is significantly lower than transmission. An Adaptive Sampling Approach (ASA) that estimates the best possible sampling frequencies for sensors. This approach, which requires the design of adaptive measurement approaches, minimizes the energy...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment

    Today the customer care in telecommunication using the Voice over Internet Protocol (VOIP) is a way to carry out telephone conservation over a data network for free. VoIP products promise converged telecommunications data services that are cheaper, more versatile and provide good voice quality as compared to traditional offerings. Although...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Preemptive Routing Algorithm to Reduce Link Breakage and Routing Overhead for Ad-Hoc Networks Using PRM

    Dynamic source routing algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network, route may not exit for long time. Hence, DSR algorithm finds an alternative route when the existing communicating route goes down. It becomes a time...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Efficient ARM for Different Network Data Collection

    Association Rule Mining (ARM) discovers correlations between different item-sets in a transaction database. It provides important knowledge in business for decision makers. Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in distributed...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Improving CA-AOMDV Protocol Against Blackhole Attacks

    Mobile ad hoc networks are infrastructure less network where the nodes themselves are responsible for routing the packets. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks are not...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Defending Against Sybil Attacks in Anonymizing Networks

    An anonymity network enables users to access the Web while blocking any tracking or tracing of their identity on the Internet. Tor is open-source anonymity software free to public use. This type of online anonymity moves Internet traffic through a worldwide network of volunteer servers. Anonymity networks prevent traffic analysis...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    STRAB: Sensing and Tracing Back Attackers Against Encrypted Protocols

    The uncontrolled growth of the network based applications has contributed to enormous security leaks. Though the encrypted protocols are used to provide secure communication, Intrusion detection systems (Idss) are often employed to monitor network traffic and host activities that may lead to unauthorized accesses and attacks against vulnerable services. Anomaly...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Review on Intelligent Deployment of Nodes for Improving the Performance of Overlay Networks

    Overlay network is a network built on top of one or more existing networks. It adds an additional layer of virtualization to the network. Overlays enhance the performance of the network. They provide various services to the underlying network for efficient resource utilization. Overlay nodes present in the network can...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Secure Migration Process for Mobile Agents Form One Host to Another Host

    In the past few years the computer systems have evolved from monolithic computing device to much more complex client-server environment. Now new phase of evaluation allows complete mobility of application code among supporting platforms to form a loosely-coupled distributed system. Mobile-agent paradigm is one such technology. Mobile agents paradigm has...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Surveying on Road Safety Using Vehicular Communication Networks

    Today's people are more and more concerned about their privacy and security. Vehicular Communication (VC) systems have the potential to improve road safety and driving comfort. Vehicular communication based on wireless short-range technology enables spontaneous information exchange among vehicles and with road-side stations. A novel class of wireless networks that...

    Provided By JCAKSRCE

  • White Papers // Jan 2012

    A New User Framework to Design MD Model from Relational One

    Data in a data warehouse is organized in a multidimensional model. This multidimensional model helps in faster query processing and efficient OLAP operations for data analysis and decision making. In this paper, the authors introduce a framework which proposes design methodologies to map the relational database into a multidimensional model....

    Provided By JCAKSRCE

  • White Papers // Sep 2013

    Study of Knowledge Based Admission Control for a Software-as-a-Service Provider in Cloud Computing Environments

    Software as a Service (SaaS) provides access to applications to end users over the Internet without upfront investment in infrastructure and software. To serve their customers, SaaS providers utilize resources of internal data centers or rent resources from a public Infrastructure as a Service (IaaS) provider. In-house hosting can increase...

    Provided By JCAKSRCE

  • White Papers // Apr 2013

    Cloud-Based Image Processing with Data Priority Distribution Mechanism

    Most users process short tasks using MapReduce. In other words, most tasks handled by the map and reduce functions require low response time. Currently, quite few users use MapReduce for 2D to 3D image processing, which is highly complicated and requires long execution time. However, in the author's opinion, MapReduce...

    Provided By JCAKSRCE

  • White Papers // Mar 2014

    A Novel Approach for Privacy Preserving Multiparty Data Publishing

    Data mining is the technique normally used for extracting the data from large database. Collaborative data publishing is the emerging technique to publish the data in one webpage and provide web service on more than one page with security. Collaborative data publish has the problem for anonymizing horizontally partitioned data...

    Provided By JCAKSRCE

  • White Papers // Jan 2013

    A Survey to Analysis of Topological Relational Ranked Clusters for Spatial and Temporal Data

    Data mining is the process of discovering interesting and useful patterns of information embedded in large databases. Data clustering is a very important technique for exploratory information analysis in data mining and has been the main target of considerable research in many domains for many years. Clustering may be a...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    FPGA Implementation of High Performance Face Detection Using MCT and Adaboost Algorithm

    In this paper, the proposed novel architecture and FPGA implementation is for high performance real time face detection engine for various illuminations in mobile applications. MCT (Modified Census Transform) and adaboost algorithms are the basic algorithms used for face detection engine. The hardware architecture of face detection engine is for...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Design of Error Correction and Allusion in Turbo Decoder for Wireless Application

    Wireless Sensor Network (WSN) consists of limited energy resources, which reduce the processing capabilities and a radio frequency communication unit with limited transmission power. In wireless communication, Automatic Repeat reQuest (ARQ) technique are used which has power loss in packet retransmission. Then Error Correcting Code (ECC) can be used to...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Autonomously Reconfiguring Failures in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are being developed actively and deployed widely for a variety of applications They have also been evolving in various forms to meet the increasing capacity demands. However during their lifetime, multi hop Wireless Mesh Networks (WMNs) experience frequent link failures caused by channel interference, dynamic obstacles,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Encrypted-Data Routing Protocol for Wireless Sensor Networks

    In sensor networks, it is crucial to design and employ energy-efficient communication protocols, since nodes are battery-powered and thus their lifetimes are limited. Such constraints combined with a typical deployment of large number of sensor nodes have posed many challenges to the design and management of sensor networks. These challenges...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Data Delivery in Wireless Sensor Network Using Collaborative Randomized Dispersive Routes

    In wireless sensor networks (WSNs) Compromised-node and denial-of-service are two key attacks that create the black hole in the network. In existing classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. Once the adversary acquires the routing algorithm, it can compute the same routes...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Green Networking

    Green networking refers to the practice of using networking resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Energy Based Multipath Routing Protocols for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consists of small nodes with sensing, computation, wireless communications capabilities have led to many new routing protocols specifically designed for sensor networks and enabling real time applications in wireless sensor networks. Wireless sensor networks demands certain delay sensitive, bandwidth requirements and reliability, energy efficient not only...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Exploiting Resource Overloading Using Utility Accrual Approach for Parallel Data Processing in Cloud

    Parallel Data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. One of an IaaS cloud's key feature is the provisioning of compute resources on demand. The computer resources available in the cloud are highly dynamic and possibly heterogeneous. Nephele is the first data processing...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Route Diversity Based Optimal Path Selection Using Random Key Generation

    A network programming protocols provide an efficient way to update program images running on sensor nodes without having physical access to them. Securing these updates, however, remains a challenging and important issue, given the open environment where sensor nodes are often deployed. Several approaches addressing these issues have been reported,...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Efficient Ranking on Road Network by Quality Preferences

    A spatial preference query ranks objects based on the qualities of features in their spatial neighborhood. For example, consider a road network database with available paths for two points. A customer may want to rank the paths with respect to their distance defined after aggregating the qualities of other features...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Automatised Toll Gate System Using Passive RFID and GSM Technology

    Automatised toll gate system using passive Radio Frequency Identification emerges as a converging technology where time and efficiency are the matter of priority in toll collection systems of present day. In order to overcome the major issue of collision, in the authors' project the reader is placed in a strip...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Reliable Determination of Zombies Based on Entropy Variation

    A zombie is a computer, connected to the internet that has been compromised by a cracker. Zombie computers are often used to launch distributed denial-of-service attacks. Distributed denial-of-service (ddos) attacks are a critical threat to the internet. However, the memoryless feature of the internet routing mechanisms makes it extremely hard...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Survey of ARToolkitBased Augmented Reality Applications

    Augumented Reality is a budding area in virtual reality research, which tends to present a combination of real and virtual image to the user. This paper briefs a short survey on Augmented Reality applications that uses ARToolkit. Augmented Reality is one of the research hotspots of many renowned foreign universities...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Development of Fuzzy Based Detection of Link Failure in Overlay Network

    Performance of overlay networks can be improved if proper detection of link failures is done and deployment of overlay nodes in exact locations are done. The major factors that result in link failure are loss of signals, loss of synchronization, link capacity and faulty interfaces. Though extensive research is carried...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Performance Analysis of an Adaptive Mechanism for Access Control in Vehicular Ad Hoc Networks

    Vanets have the ability to transmit various types of information between a vehicle and another, or between a vehicle and a fixed station. However, transmission may be impaired due to long delays, quantity of collisions and signal noise. This is caused, in part, by abrupt changes in the network topology....

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Adaptive Sampling Approach for Energy Conservation in WSN Using Embedded System

    Energy conservation methods for wireless sensor networks generally assume that data acquirement and processing have energy utilization that is significantly lower than transmission. An Adaptive Sampling Approach (ASA) that estimates the best possible sampling frequencies for sensors. This approach, which requires the design of adaptive measurement approaches, minimizes the energy...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Improving Quality in Voice Over Internet Protocol (VOIP) on Mobile Devices in Pervasive Environment

    Today the customer care in telecommunication using the Voice over Internet Protocol (VOIP) is a way to carry out telephone conservation over a data network for free. VoIP products promise converged telecommunications data services that are cheaper, more versatile and provide good voice quality as compared to traditional offerings. Although...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Preemptive Routing Algorithm to Reduce Link Breakage and Routing Overhead for Ad-Hoc Networks Using PRM

    Dynamic source routing algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network, route may not exit for long time. Hence, DSR algorithm finds an alternative route when the existing communicating route goes down. It becomes a time...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Efficient ARM for Different Network Data Collection

    Association Rule Mining (ARM) discovers correlations between different item-sets in a transaction database. It provides important knowledge in business for decision makers. Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in distributed...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Improving CA-AOMDV Protocol Against Blackhole Attacks

    Mobile ad hoc networks are infrastructure less network where the nodes themselves are responsible for routing the packets. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks are not...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Defending Against Sybil Attacks in Anonymizing Networks

    An anonymity network enables users to access the Web while blocking any tracking or tracing of their identity on the Internet. Tor is open-source anonymity software free to public use. This type of online anonymity moves Internet traffic through a worldwide network of volunteer servers. Anonymity networks prevent traffic analysis...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    The Performance Comparison of an AODV, DSR, DSDV and OLSR Routing Protocols in Mobile Ad-Hoc Networks

    Wireless networking is an emerging technology that allows users to access information and services electronically, regardless of their geographic position. Wireless networks can be infrastructure networks or infra structure less (Ad-hoc) networks. An ad-hoc network is a collection of mobile nodes which forms a temporary network without the aid of...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Evaluation and Delay of the Routing Protocols in Ad-Hoc Wireless Networks

    A wireless ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. A user can move anytime in an ad hoc scenario and, as a result, such a network needs to have routing protocols which can...

    Provided By JCAKSRCE

  • White Papers // Jul 2012

    Energy-Efficient Protocol for Wireless Sensor Networks

    The power consumption of nodes determines the lifetime of the wireless sensor network. Thus, the design of low-power node is very important. The sensors sense physical phenomena in different ways, designing and testing a different coverage protocol for each sensing model is indeed a costly task. To address these challenging...

    Provided By JCAKSRCE

  • White Papers // Jan 2013

    Multi Algorithm Approach for Face Recognition Using Average Half Face

    Face recognition has received much attention in recent years due to its many applications such as human computer interface, video surveillance and face image database management. It is a challenging technique due to under different lighting conditions, facial expressions and changes in head pose. Single class of feature is not...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    STRAB: Sensing and Tracing Back Attackers Against Encrypted Protocols

    The uncontrolled growth of the network based applications has contributed to enormous security leaks. Though the encrypted protocols are used to provide secure communication, Intrusion detection systems (Idss) are often employed to monitor network traffic and host activities that may lead to unauthorized accesses and attacks against vulnerable services. Anomaly...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Review on Intelligent Deployment of Nodes for Improving the Performance of Overlay Networks

    Overlay network is a network built on top of one or more existing networks. It adds an additional layer of virtualization to the network. Overlays enhance the performance of the network. They provide various services to the underlying network for efficient resource utilization. Overlay nodes present in the network can...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Secure Migration Process for Mobile Agents Form One Host to Another Host

    In the past few years the computer systems have evolved from monolithic computing device to much more complex client-server environment. Now new phase of evaluation allows complete mobility of application code among supporting platforms to form a loosely-coupled distributed system. Mobile-agent paradigm is one such technology. Mobile agents paradigm has...

    Provided By JCAKSRCE

  • White Papers // Mar 2012

    Reduce Delays in End to End DVB-RCS Satellite Networks

    In today's satellite network to a return-channel for communication between terminals used in the DVB-RCS standard is provided by this feature. In order to allocate the bandwidth of the standard protocol used is called DAMA where algorithms such as CRA, RBDC uses to request bandwidth Since these methods are simple...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    A Surveying on Road Safety Using Vehicular Communication Networks

    Today's people are more and more concerned about their privacy and security. Vehicular Communication (VC) systems have the potential to improve road safety and driving comfort. Vehicular communication based on wireless short-range technology enables spontaneous information exchange among vehicles and with road-side stations. A novel class of wireless networks that...

    Provided By JCAKSRCE

  • White Papers // Feb 2012

    Secure Cluster Head Election for Intrusion Detection in MANET

    In this paper, leader election is studied in the presence of selfish node for intrusion detection in Mobile Ad Hoc NETworks (MANETs).To balance the resource consumption among all the nodes, the most cost-efficient leaders with the most remaining energy must be elected as leader. But, the selfish nodes may behave...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    Comparative Analysis and Inferences for Enhancement of Cognitive Radio Networks

    Cognitive Radio Network opportunistically exploits locally unused spectrum which is not heavily occupied by licensed users. It provides a new path to resolve spectral scarcity and to avoid spectral congestion, without disturbing the QoS requirements of others in the system. Of the many challenges involved in the practical ways of...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    Dropping of Call Due to Congestion in Mobile Network

    A Mobile network can be defined as the group of multiple nodes like MS, BTS/Node B, BSC/RNC, MSS, HLR, etc. These nodes architecture are vendor dependent but in general it consist specific hardware & software. Software is application specific & vendor proprietary. Nokia Siemens Network, Ericsson, Huawei are major manufacturer...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    The Adaptation of SC-FDMA in the Uplink Gives Edge to LTE Over WiMAX2 in Ad-Hoc Network

    Relay technologies have been actively studied and considered in the standardization process of next-generation mobile broadband communication systems such as 3GPP LTE-Advanced, IEEE 802.16j, and IEEE 802.16m. This paper first introduces and compares different relay types in LTE-Advanced and WiMAX standards. Simulation results show that relay technologies can effectively improve...

    Provided By JCAKSRCE

  • White Papers // Apr 2012

    A Comparative Study on the Topology Control Mechanism Using GAHCT and FLHCT for an N-Tier Heterogeneous Wireless Sensor Network

    Topology control targets to achieve an energy efficient network with limited number of communication links between the sensor nodes. One way to attain a reduced topology is via a cooperative technique. In this paper, a new methodology GAHCT: Genetic Algorithm based Hierarchical Cooperative Technique is proposed and implemented for a...

    Provided By JCAKSRCE