JNTU College of Engineering

Displaying 1-12 of 12 results

  • White Papers // Nov 2012

    Data Confidentiality Scalability and Accountability (DCSA) in Cloud Computing

    This paper aims to achieve data confidentiality scalability and accountability in cloud computing by determining first the security mechanisms required for each data sensitivity level, and which of these security controls may not be supported in certain computing environments, then which solutions can be used to cope with the identified...

    Provided By JNTU College of Engineering

  • White Papers // Oct 2012

    Erlang Capacity Evaluation in GSM And CDMA Cellular Systems

    Interference is the important capacity limiting factor in cellular systems. The main source of interference is Co-Channel Interference (CCI) that comes from base stations operating in same frequency band. In this paper a novel method is introduced to evaluate erlang capacities for GSM and CDMA cellular networks. The probability of...

    Provided By JNTU College of Engineering

  • White Papers // Sep 2012

    Estimation and Compensation of Inter Carrier Interference in WIMAX Physical Layer Under Various Channel Models

    WiMAX is wireless Interoperability for microwave access has emerged as a promising solution for transmission of higher data rates for fixed and mobile applications. IEEE 802.16d and e are the standards proposed by WiMAX group for fixed and mobile. As the wireless channel have so many limitation Such as multipath,...

    Provided By JNTU College of Engineering

  • White Papers // May 2012

    Cooperative MIMO Communications in Wireless Ad Hoc Rayleigh Fading Networks

    In this paper addresses Rayleigh fading networks, and in particular, wireless ad-hoc and sensor networks over Rayleigh fading channels. First, the authors will model Rayleigh fading networks and show how to map the wireless fading channel to the upper layer parameters for cross-layer design. Based on the developed fading network...

    Provided By JNTU College of Engineering

  • White Papers // Mar 2012

    Failure Detection Algorithm for Testing Dynamic Web Applications

    Web applications are the most widely used software in the internet. When a web application is developed and deployed in the real environment, It is very severe if any bug found by the attacker or the customer or the owner of the web application. It is the very important to...

    Provided By JNTU College of Engineering

  • White Papers // Jul 2011

    Developing a Code Readability Model to Improve Software Quality

    Software maintenance is one of the main phase in software evaluation. This paper presents the relation between software metrics and maintainability. It explains about the concept of Software code readability and its relation to software quality. The quality of code is very essential for the future and for the reuse...

    Provided By JNTU College of Engineering

  • White Papers // Jul 2011

    Connection and Handover Management in ATM Networks Using Queuing Model for QoS Enhancement

    There is static and dynamic priority queuing systems to model various classes with different service requirements. The static priority queuing systems satisfy the stringent delay requirement of a high priority class, but they may cause excessive delay for a low priority class. Recently, to overcome this shortcoming, dynamic (hybrid) priority...

    Provided By JNTU College of Engineering

  • White Papers // Jan 2011

    Prevention of WormholeAttacks in Geographic Routing Protocol

    As mobile ad hoc network applications are deployed, security emerges as a central requirement. Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic...

    Provided By JNTU College of Engineering

  • White Papers // Oct 2010

    Multicast Zone Routing Protocol in Wireless Mobile Adhoc Networks

    The use of multicasting with the network has many benefits. Multicasting reduces the communication cost for applications that sends the same data to many recipients instead of sending via multiple unicast. This paper proposes Multicast Zone Routing Protocol (MZRP) for Mobile Ad-hoc Networks (MANETs). MZRP applies on-demand procedures to dynamically...

    Provided By JNTU College of Engineering

  • White Papers // Dec 2009

    An Efficient Admission Control Algorithm for Load Balancing in Hierarchical Mobile IPv6 Networks

    In hierarchical Mobile IPv6 networks, Mobility Anchor Point (MAP) may become a single point of bottleneck as it handles more and more Mobile Nodes (MNs). A number of schemes have been proposed to achieve load balancing among different MAPs. However, signaling reduction is still imperfect because these schemes also avoid...

    Provided By JNTU College of Engineering

  • White Papers // Oct 2009

    Energy Efficient Security Architecture for Wireless Bio-Medical Sensor Networks

    Latest developments in VLSI, wireless communications, and biomedical sensing devices allow very small, lightweight, low power, intelligent sensing devices called biosensors. A set of these devices can be integrated into a Wireless Biomedical Sensor Network (WBSN), a new breakthrough technology used in telemedicine for monitoring the physiological condition of an...

    Provided By JNTU College of Engineering

  • White Papers // Jan 2009

    Design of an Efficient QoS Architecture (DEQA) for Mobile Ad Hoc Networks

    With the increasing widespread use of wireless technologies, Quality of Service (QoS) provisioning in ad hoc networks remains a challenging task. Good scalability of the QoS architecture is necessary, as the size of the ad hoc networks is huge. In this paper authors propose a Design of an Efficient QoS...

    Provided By JNTU College of Engineering

  • White Papers // Nov 2012

    Data Confidentiality Scalability and Accountability (DCSA) in Cloud Computing

    This paper aims to achieve data confidentiality scalability and accountability in cloud computing by determining first the security mechanisms required for each data sensitivity level, and which of these security controls may not be supported in certain computing environments, then which solutions can be used to cope with the identified...

    Provided By JNTU College of Engineering

  • White Papers // Oct 2010

    Multicast Zone Routing Protocol in Wireless Mobile Adhoc Networks

    The use of multicasting with the network has many benefits. Multicasting reduces the communication cost for applications that sends the same data to many recipients instead of sending via multiple unicast. This paper proposes Multicast Zone Routing Protocol (MZRP) for Mobile Ad-hoc Networks (MANETs). MZRP applies on-demand procedures to dynamically...

    Provided By JNTU College of Engineering

  • White Papers // Jan 2009

    Design of an Efficient QoS Architecture (DEQA) for Mobile Ad Hoc Networks

    With the increasing widespread use of wireless technologies, Quality of Service (QoS) provisioning in ad hoc networks remains a challenging task. Good scalability of the QoS architecture is necessary, as the size of the ad hoc networks is huge. In this paper authors propose a Design of an Efficient QoS...

    Provided By JNTU College of Engineering

  • White Papers // Dec 2009

    An Efficient Admission Control Algorithm for Load Balancing in Hierarchical Mobile IPv6 Networks

    In hierarchical Mobile IPv6 networks, Mobility Anchor Point (MAP) may become a single point of bottleneck as it handles more and more Mobile Nodes (MNs). A number of schemes have been proposed to achieve load balancing among different MAPs. However, signaling reduction is still imperfect because these schemes also avoid...

    Provided By JNTU College of Engineering

  • White Papers // Oct 2009

    Energy Efficient Security Architecture for Wireless Bio-Medical Sensor Networks

    Latest developments in VLSI, wireless communications, and biomedical sensing devices allow very small, lightweight, low power, intelligent sensing devices called biosensors. A set of these devices can be integrated into a Wireless Biomedical Sensor Network (WBSN), a new breakthrough technology used in telemedicine for monitoring the physiological condition of an...

    Provided By JNTU College of Engineering

  • White Papers // Jan 2011

    Prevention of WormholeAttacks in Geographic Routing Protocol

    As mobile ad hoc network applications are deployed, security emerges as a central requirement. Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic...

    Provided By JNTU College of Engineering

  • White Papers // Jul 2011

    Connection and Handover Management in ATM Networks Using Queuing Model for QoS Enhancement

    There is static and dynamic priority queuing systems to model various classes with different service requirements. The static priority queuing systems satisfy the stringent delay requirement of a high priority class, but they may cause excessive delay for a low priority class. Recently, to overcome this shortcoming, dynamic (hybrid) priority...

    Provided By JNTU College of Engineering

  • White Papers // Jul 2011

    Developing a Code Readability Model to Improve Software Quality

    Software maintenance is one of the main phase in software evaluation. This paper presents the relation between software metrics and maintainability. It explains about the concept of Software code readability and its relation to software quality. The quality of code is very essential for the future and for the reuse...

    Provided By JNTU College of Engineering

  • White Papers // Mar 2012

    Failure Detection Algorithm for Testing Dynamic Web Applications

    Web applications are the most widely used software in the internet. When a web application is developed and deployed in the real environment, It is very severe if any bug found by the attacker or the customer or the owner of the web application. It is the very important to...

    Provided By JNTU College of Engineering

  • White Papers // May 2012

    Cooperative MIMO Communications in Wireless Ad Hoc Rayleigh Fading Networks

    In this paper addresses Rayleigh fading networks, and in particular, wireless ad-hoc and sensor networks over Rayleigh fading channels. First, the authors will model Rayleigh fading networks and show how to map the wireless fading channel to the upper layer parameters for cross-layer design. Based on the developed fading network...

    Provided By JNTU College of Engineering

  • White Papers // Sep 2012

    Estimation and Compensation of Inter Carrier Interference in WIMAX Physical Layer Under Various Channel Models

    WiMAX is wireless Interoperability for microwave access has emerged as a promising solution for transmission of higher data rates for fixed and mobile applications. IEEE 802.16d and e are the standards proposed by WiMAX group for fixed and mobile. As the wireless channel have so many limitation Such as multipath,...

    Provided By JNTU College of Engineering

  • White Papers // Oct 2012

    Erlang Capacity Evaluation in GSM And CDMA Cellular Systems

    Interference is the important capacity limiting factor in cellular systems. The main source of interference is Co-Channel Interference (CCI) that comes from base stations operating in same frequency band. In this paper a novel method is introduced to evaluate erlang capacities for GSM and CDMA cellular networks. The probability of...

    Provided By JNTU College of Engineering