K.S.Rangasamy College of Technology

Displaying 1-12 of 12 results

  • White Papers // Apr 2012

    Efficient Algorithms for Extension of Mobile Backbone Networks

    Network wide communication is an essential criterion for all wireless sensor networks, to transmit the collected data from environment to base station (sink node) in an efficient way. The wide network coverage is provided by constructing Mobile Backbone Networks (MBN), which are dynamic networks. These networks have two types of...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Mar 2012

    Improving Communication Efficiency With Adaptable Transmissions for Uncoordinated WLANs

    Campus and enterprise wireless networks are increasingly characterized by ubiquitous coverage and rising traffic demands. Efficiently assigning channels to Access Points (APs) in these networks can significantly affect the performance and capacity of the WLANs. In this paper, the authors show that communication efficiency can be improved significantly with adaptable...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Jul 2011

    Scenario Based Performance Evaluation of DSR and AODV Routing Protocols

    Mobile Ad hoc NETwork (MANET) is a temporary network with collection of nodes with dynamic infrastructure. It requires efficient routing protocols to provide better data transmission. A number of protocols have been implemented for efficient routing and packet transmission. Some of the protocols have been proposed in the literature based...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Jul 2011

    Enterprise Mold Distinctiveness Via Cloud Through Software-as-a-Service

    Cloud computing is a disruptive technology with profound implications not only for Internet services but also for the field of information technology. The cloud uses resources in an optimal manner, which implies sharing of resources across a set customer. The cloud business model is hosted for a web services on...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Apr 2011

    A Conceptual Study Of Biometric Security And Its Perception Towards Usability

    Biometrics in high technology sector uses an individual's unique biological traits to determine one's identity. Advances in biometric technology are focusing both on better security and cost effectiveness. Modern methods of authentication differ from traditional methods in several ways. Among the various types of biometric security system prevailing in India,...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Dec 2010

    Power-Aware Multiple Path Multicast Adhoc on Demand Distance Vector Routing Protocol

    Mobile Ad hoc NETworks (MANETs) are characterized by dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting to the source nodes with destinations may very unstable and go down at any time, making communication over ad hoc networks difficult. Energy efficiency is...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Jul 2010

    Reliable and Efficient Algorithm for Broadcasting in Asymmetric Mobile Ad Hoc Networks

    Network wide broadcasting is a fundamental operation in ad hoc networks. In broadcasting, a source node sends a message to all the other nodes in the network. Unlike in a wired network, a packet transmitted by a node in ad hoc wireless network can reach all neighbors. Therefore, the total...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2009

    Reversible Image Authentication With Tamper Localization Based on Integer Wavelet Transform

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2009

    A Performance Comparison of Multipath Multicast Routing Protocols for MANET

    Mobile Ad hoc NETworks (MANETs) are characterized by dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting to the source nodes with destinations may very unstable and go down at any time, making communication over ad hoc networks difficult. Multicasting is intended...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Apr 2009

    Nonsaturation Throughput Enhancement of IEEE 802.11b Distributed Coordination Function for Heterogeneous Traffic Under Noisy Environment

    This paper proposes a mechanism named Modified Backoff (MB) mechanism to decrease the channel idle time in IEEE 802.11 Distributed Coordination Function (DCF). In the noisy channel, when Signal-to-Noise Ratio (SNR) is low, applying this mechanism in DCF greatly improves the throughput and lower the channel idle time. This paper...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2008

    Detection of Spoofing Attacks Using Intrusive Filters for DDoS

    Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification DDoS defense scheme has recently been proposed as a deterministic packet marking scheme that allows a DDoS victim to filter out attack packets on a per packet basis with high accuracy after only a few attack packets...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2008

    A Power-Aware Low-Latency Cache Management Architecture for Mobile Computing Environments

    Caching frequently accessed data items on the client side is an effective technique to improve performance in a mobile environment. Classical cache management strategies may not be suitable for mobile environments due to the disconnection and mobility of the mobile clients. This paper proposes a novel Cache Management Architecture (CMA)...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Apr 2009

    Nonsaturation Throughput Enhancement of IEEE 802.11b Distributed Coordination Function for Heterogeneous Traffic Under Noisy Environment

    This paper proposes a mechanism named Modified Backoff (MB) mechanism to decrease the channel idle time in IEEE 802.11 Distributed Coordination Function (DCF). In the noisy channel, when Signal-to-Noise Ratio (SNR) is low, applying this mechanism in DCF greatly improves the throughput and lower the channel idle time. This paper...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2008

    Detection of Spoofing Attacks Using Intrusive Filters for DDoS

    Internet hosts are threatened by large-scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification DDoS defense scheme has recently been proposed as a deterministic packet marking scheme that allows a DDoS victim to filter out attack packets on a per packet basis with high accuracy after only a few attack packets...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2008

    A Power-Aware Low-Latency Cache Management Architecture for Mobile Computing Environments

    Caching frequently accessed data items on the client side is an effective technique to improve performance in a mobile environment. Classical cache management strategies may not be suitable for mobile environments due to the disconnection and mobility of the mobile clients. This paper proposes a novel Cache Management Architecture (CMA)...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Jul 2010

    Reliable and Efficient Algorithm for Broadcasting in Asymmetric Mobile Ad Hoc Networks

    Network wide broadcasting is a fundamental operation in ad hoc networks. In broadcasting, a source node sends a message to all the other nodes in the network. Unlike in a wired network, a packet transmitted by a node in ad hoc wireless network can reach all neighbors. Therefore, the total...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Dec 2010

    Power-Aware Multiple Path Multicast Adhoc on Demand Distance Vector Routing Protocol

    Mobile Ad hoc NETworks (MANETs) are characterized by dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting to the source nodes with destinations may very unstable and go down at any time, making communication over ad hoc networks difficult. Energy efficiency is...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2009

    Reversible Image Authentication With Tamper Localization Based on Integer Wavelet Transform

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Nov 2009

    A Performance Comparison of Multipath Multicast Routing Protocols for MANET

    Mobile Ad hoc NETworks (MANETs) are characterized by dynamic topology, limited channel bandwidth and limited power at the nodes. Because of these characteristics, paths connecting to the source nodes with destinations may very unstable and go down at any time, making communication over ad hoc networks difficult. Multicasting is intended...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Jul 2011

    Scenario Based Performance Evaluation of DSR and AODV Routing Protocols

    Mobile Ad hoc NETwork (MANET) is a temporary network with collection of nodes with dynamic infrastructure. It requires efficient routing protocols to provide better data transmission. A number of protocols have been implemented for efficient routing and packet transmission. Some of the protocols have been proposed in the literature based...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Jul 2011

    Enterprise Mold Distinctiveness Via Cloud Through Software-as-a-Service

    Cloud computing is a disruptive technology with profound implications not only for Internet services but also for the field of information technology. The cloud uses resources in an optimal manner, which implies sharing of resources across a set customer. The cloud business model is hosted for a web services on...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Mar 2012

    Improving Communication Efficiency With Adaptable Transmissions for Uncoordinated WLANs

    Campus and enterprise wireless networks are increasingly characterized by ubiquitous coverage and rising traffic demands. Efficiently assigning channels to Access Points (APs) in these networks can significantly affect the performance and capacity of the WLANs. In this paper, the authors show that communication efficiency can be improved significantly with adaptable...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Apr 2012

    Efficient Algorithms for Extension of Mobile Backbone Networks

    Network wide communication is an essential criterion for all wireless sensor networks, to transmit the collected data from environment to base station (sink node) in an efficient way. The wide network coverage is provided by constructing Mobile Backbone Networks (MBN), which are dynamic networks. These networks have two types of...

    Provided By K.S.Rangasamy College of Technology

  • White Papers // Apr 2011

    A Conceptual Study Of Biometric Security And Its Perception Towards Usability

    Biometrics in high technology sector uses an individual's unique biological traits to determine one's identity. Advances in biometric technology are focusing both on better security and cost effectiveness. Modern methods of authentication differ from traditional methods in several ways. Among the various types of biometric security system prevailing in India,...

    Provided By K.S.Rangasamy College of Technology