Kurukshetra University

Displaying 1-40 of 466 results

  • White Papers // Jan 2014

    Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach

    Today every security expert worries about the security problems and tries to find out the secure solution. Because it is a challenging aspect of communications today which touches many spheres including memory space, processing speed, code development and maintenance issues? The problem, exaggerated when it comes to dealing with lightweight...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Information Security in Grid Computing

    The spread of worldwide networks and the technological trend arc feeding the progress of network and distributed computing in different directions (grid, cloud, autonomic, ubiquitous, pervasive, volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Risk Management in Information Security System

    In information security system there are always some cases which come up with some risks. To handle the risks there must be risk management in information security system. An appropriate risk management process is an extremely critical component of a successful information security program. The main objective of an organization's...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Analysis of ANSN Attack on OLSR Based MANETs

    A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing (OLSR) protocol is a route management protocols for such mobile ad hoc networks. This...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Securing E-Commerce

    E-commerce provides an important medium for doing business on global based. E-commerce is the electronic automation of business process. E-commerce has become a critical component in any business competitive strategy. Organizations are gaining opportunities and benefits such as global presence and improved competitiveness from web-based e-commerce. In this paper, the...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Big Data Analytics Using Hadoop Components Like Pig and Hive

    In big data world, Hadoop Distributed File System (HDFS) is very popular. It provides a framework for storing data in a distributed environment and also has set of tools to retrieve and process. These data set using map-reduce concept. In this paper, a thorough research has been carried to discuss...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Improving the Performance of IDS Using Genetic Algorithm

    Intrusion Detection System (IDS) aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. The growing number of Internet threats increasingly inspires the need of applying a defense in depth concepts to protect worldwide computer system from being intruded for grabbing information. The authors...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Wavelet Based Fingerprint Authentication System

    Fingerprint biometric is very useful in application which requires identity to be claimed. It plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Wavelet analysis and its applications to fingerprint verification is one of the fast growing areas for research in recent...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    A Novel Bayesian Approach Against Phishing Attacks Based on Textual and Visual Content

    Phishing attacks are a major concern for preserving internet users' privacy. By combining social engineering and website forgery techniques, phishing attacks spoof the identity of a company (typically a bank or an auction site), to trick Internet users to reveal confidential information. The perfect phishing attack creates a website very...

    Provided By Kurukshetra University

  • White Papers // Jul 2013

    Potential Covert Channel in Distributed Database

    In today's environment. There is need of distributed database in communication. This paper provides a faster access and remove delays throughout the system .the paper will examine the features of distributed database architecture. The learning of distributed database management system will lead them for successful design. The design will improve...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Mining of Web Server Logs Using Extended Apriori Algorithm

    Association rule mining is one of the most significant techniques in the field of data mining. It is very useful in discovering relationships hidden in large transaction datasets such as frequent patterns, associations etc. One of the popular and important algorithms in this category is Apriori algorithm which finds frequent...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Performance of Flow Based Intrusion Detection System Over Traditional Intrusion Detection in High Speed Network

    The vast growth of 1-10Gbps network technology in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, the authors depend on the Internet in the people daily life for simple tasks such as checking emails, but also for managing private and financial information....

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    A Survey on Security Challenges of Cloud Computing

    Cloud computing has revolutionized the industry because of its benefits like on-demand services, scalability, elasticity, minimization of capital expenditure, etc. It is not a new concept but a fusion of distributed computing, grid computing, parallel computing and so on. It attracts the small enterprises as it eliminates the requirements for...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Highly Available XenApp Cloud

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Acceptability of Fingerprint as Biometric Traits

    Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on \"Who the user is,\" rather than by \"What the users' possesses\" (e.g., an ID card). Among...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Multi Packed Security Addressing Challenges in Cloud Computing

    Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Cloud Computing: Performance Implications and Challenges

    Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Information Management Security in Multiple Networks for Development of Business and E-Commerce

    In this paper, the authors will discuss about Internet which has become the information super highway. The evolving Internet and its related technologies have allowed businesses to communicate in new and strategic ways with various types of people and organizations. Over the years, there have been additions of feature upon...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Enhanced Inter-Cloud System Architecture

    Cloud computing gains tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary provided with all the infrastructure facilities that a cloud user needs. But as the no of organizations adopting cloud system increases, the services providers need to ensure availability of various services, infrastructure...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Detection and Prevention of Wormhole Attack in MANET: A Review

    Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc NETwork (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Survey of Network Intrusion Detection Using K-Mean Algorithm

    Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly and slow. Intrusion detection techniques can be categorizes into irregularity detection and mistreats detection. Anomaly detection systems, for example, IDES Intrusion Detection...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Spoof Attack Detection in Fingerprint Authentication Using Hybrid Fusion

    In the modern era, with the growing need of biometric technologies, spoof attacks are becoming a serious concern. A number of solutions have been proposed to detect the use of fake fingerprints. This paper takes advantage of skin elements in fingerprints, namely: minutiae points and ridge bifurcations to investigate spoof...

    Provided By Kurukshetra University

  • White Papers // Feb 2013

    Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review

    MANET (Mobile Ad-hoc NETwork) refers to a multi-hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANET'S are actually self organizing and adaptive networks that can be formed and deformed...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    A Comprehensive Study of Latest Security Models for MANETs: Covering Intrusion Detection and Denial of Service Attacks

    Mobile Ad-hoc NETworks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET's are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    Wireless Sensor Networks: Architecture, Protocols

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    Analysis of Security Criteria for Partner Network

    The authors are allowing people outside their organization access to proprietary data and applications - over the internet. The objectives of this research are to form a secured infrastructure between partner network and internet. In today's competitive business landscape, organizations are compelled to share data, files, and applications with external...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    The Study of Multimedia Data Model Technology Based on Cloud Computing

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm in which resources...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Oct 2012

    Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, Routing is one of the central requirements. Due to non central control, security is the major issue in...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing Security and Privacy Concerns

    In last few years, cloud computing concept has groomed a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Now, recession-hit companies have acknowledged that simply by shifting...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Framework for Enhancing Security and Performance in Multi-Tenant Applications

    The ability to scale a web application or website is tied directly to understanding where the resource constraints lie and what impact the addition of various resources has on the application. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Case Study on Regression Test Automation for Data Warehouse Quality Assurance

    In current trend, every software development, enhancement, or maintenance project includes some quality assurance activities. Quality assurance attempts defects prevention by concentrating on the process of producing the rather than working on the defect detection after the product is built. Regression testing means rerunning test cases from existing test suites...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Comparative Study of Classification Algorithms

    Course Recommender System in E-Learning is a system which recommend the course to the student based on the choice of various student collected from huge amount of data of courses offered through Moodle package of the college. Here, in this paper, the authors compare the five classification algorithm to choose...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Knowledge Based Approach to Enhance Software Architecture Review Process

    The software architecture has received increasing attention as an important subfield of software engineering. Software architecture is considered to have a significant influence on the final software product's quality. A serious phase in ensuring and validating the quality of a suggested architecture is architecture review, conducted by experienced architects. This...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    The Impact of First Aid Awareness Course Through Knowledge Management-Based E-Learning System

    The rapidly growing use of technology in education is changing the way in which knowledge is produced, stored and distributed. Online education has already been accepted as the way of the future; knowledge may be distributed across both time and space. Knowledge Management (KM) techniques can be used to capture,...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    On-Demand Routing Protocol for Manets Using Flooding Distance With Neighborhood Nodes

    The Flooding technique is often used for route discovery in on-demand routing protocols in Mobile Ad hoc NETworks (MANETs). Recently, many flooding techniques for Mobile Ad hoc NETworks (MANETs) have been proposed because the flooding distance is an important parameter in the design and evaluation of a routing protocols of...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Study on a Routing Protocol SPIN in WSN

    The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a Wireless Sensor Network (WSN). Sensor networks are recently rapidly growing research area in wireless communications and distributed...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Intelligent Clutter Rejection for Vehicular RADAR

    Externalities of road traffic include congestion, accidents, conception of scare space. One of the measures to control these externalities are by Intelligent Transportation System (ITS). Clutter is the major problem for outdoor Radar operations and there is no standard measure to reject it. Moving Target Indicator (MTI) is a proven...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Development of MIMO - WIMAX Based Communication System for Transportation

    The geographical coverage area of communication is increased for the efficiency of the ITS (Intelligent Transportation System) customers. The maximum extent of coverage area provides the beneficiary of satisfying the customers with the desired needs of the customers, as it keeps changing rapidly. Convergence of the noble technologies WIMAX and...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Vehicle Detection Using Image Processing and Fuzzy Logic

    Vehicles moving on road are of importance because problems like traffic congestion, economic waste, jamming on the underpasses and over-bridges (if the vehicle passing through is not of the permissible size) are associated with them. These problems can be dealt with; by using various morphological processes based image processing techniques...

    Provided By Kurukshetra University

  • White Papers // Sep 2010

    Network Reliability Computation by Using Different Binary Decision Diagrams

    In this Paper the authors consider three different types of variable ordering; namely optimal ordering, good ordering and bad ordering for constructing the BDD of a given network by applying three different heuristics. This classification is based on the size of the BDD, because the size of the BDD strongly...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Design of Simulator for Reliability Estimation of Component Based Software System

    This is the age of Rapid Application Development (RAD). To achieve the goal of RAD, Component Based Software Development (CBSD) can be of great help. Here Commercial-Off-The-Shelf (COTS) components are deployed together to make a larger application. These components are designed and developed independent of each other and independent of...

    Provided By Kurukshetra University

  • White Papers // Nov 2010

    SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV...

    Provided By Kurukshetra University

  • White Papers // Jan 2010

    Node Disjoint Multipath Routing Considering Link and Node Stability Protocol: A Characteristic Evaluation

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // May 2011

    Making Ad Hoc Network Stable, Secured and Energy Efficient

    Mobile Ad hoc networking is a challenging task due to the lack of resources in the network as well as the frequent changes in the network topology. Although lots of research has been done on supporting QoS in the Internet and other networks, they are not suitable for mobile Ad...

    Provided By Kurukshetra University

  • White Papers // Jul 2008

    Simulator for Network Reliability Estimation

    Day to day increase in frequency and complexity of modern systems of telecommunications, information transmission, transportation and distribution give rise to reliability problems. These networks usually have large numbers of computers and each computer is connected by dozens of other computers/terminals. The network, being a large number of computers attached...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Quality of Service Routing in Mobile Ad Hoc Networks Considering Lifetime and Energy Predictions With Traffic Distribution

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // May 2011

    A Multi-Layer Real Time Remote Monitoring & Corporate Network System for Virulent Threats

    Corporations face a dangerous threat that existing security technologies do not adequately address, which includes malware, trackware and adware, describes any program that may track online and/or offline PC activity and locally saves or transmits those findings to third parties without user's knowledge or consent. The same activities that make...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Circular Patch Antenna With Enhanced Bandwidth Using Narrow Rectangular Slit for Wi-Max Application

    Since the inception of microstrip patch antenna constant efforts are being made to modify the overall performance of this class of antenna field. Although the microstrip antenna has some of shortcoming till this date such as low gain, narrow operating bandwidth, poor radiation efficiency, yet it has been one the...

    Provided By Kurukshetra University

  • White Papers // May 2010

    Multipath Routing Protocol With Backtracking for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is characterized by multi-hop wireless links in the absence of cellular infrastructure and frequent host mobility. In this paper, a new on-demand routing protocol is proposed, named On-demand Routing protocol with Backtracking (ORB), for multi-hop mobile ad hoc networks. Suppose a source host wants...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Dynamic Frequency Allocation Scheme of Mobile Networks Using Priority Assignment Technique

    Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate effectively avoiding interference with licensed or unlicensed users. Cognitive radio techniques provide the capability to use or share the spectrum in an opportunistic manner. In...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobility Management Protocols for Wireless Mobile Networks

    4 G wireless networks are envisioned to provide high raw data rates in the downlink as well as in the uplink directions. These networks are driven by the need to support context-rich multimedia services and applications. 4G wireless networks also support global roaming and multiple classes of services with variable...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Comparision of Approaches to Implement Intrusion Detection System

    An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. Intrusion detection system alerts the system administrators...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Design Issues: Duty Cycle Control in Wireless Sensor Networks

    Wireless sensor networks are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Wireless Sensor Networks (WSN's) are becoming popular in military and civilian applications such as surveillance, monitoring, disaster recovery, home automation and many others. Almost any sensor network application faces the...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    A Survey and Performance Analysis of Checkpointing and Recovery Schemes for Mobile Computing Systems

    Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the status information. Checkpointing is a process of saving status information. Mobile computing systems often suffer from high failure rates that are transient and independent in nature. To add reliability...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Bluetooth Quality Issues, Threats and Security Tips

    The Bluetooth, LAN's and IrDA technology is a boon of the present era. It's a part of wireless communication as well as mobile communication. Bluetooth use low power and generally do not require a license for spectrum use LAN is a technology for data transfer providing data rates up to...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobile Cloud Computing as a Future of Mobile Multimedia Database

    Most of the people use their mobile phones as mini-computers that travel with them and keep them connected 24 hours a day, and that number will surely continue to grow. Mobiles are now integral part of business world and importance of mobile database is inevitable. A new study from ABI...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Cooperative Diversity and Partner Selection Techniques in Wireless Networks

    Mobile users' quality of service is limited by the fading problem. In fading, within the duration of any given call, mobile users experience severe variations in signal attenuation. Solution to this problem is the use of some type of spatial diversity. Spatial diversity generally requires more than one antenna at...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    How to Secure Information Flow in Web Based Mobile Ad Hoc Network

    The emergence of the Mobile Ad Hoc NETworking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors,...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Location Update Strategies in Mobile Computing

    Managing location information of mobile devices is a very much important task in mobile computing systems. There is always a trade-off occurs when the location of the device will be updated (when the device is in moving condition) and the device sending effort. Here, the authors will follow dynamic location...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Controller Based IDS Architecture in Distributed Nodes

    In the past few years, the performances of wireless technology have increased tremendously. It gives rise to many new fields in the area of networking. One of field is Ad-Hoc networks. It is a network in which the members of network can directly communicate with each other with in the...

    Provided By Kurukshetra University

  • White Papers // Feb 2010

    Design Approach Towards Improving the Overall Quality of Driving Experience in VANET

    In this paper, the authors will design traffic simulator which broadcast messages from server to all vehicles within the zone of reference. This system will collect information such as alerts, traffic updates such as position, ID, direction & broadcast this information to all vehicles but intelligence will be up to...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Security and Reputation Schemes in Ad-Hoc Networks Routing

    Ad hoc networks have vital problem concerning their security aspects. These must be solved in order to realize complete Ad hoc applications. The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. There are recent research efforts in securing ad hoc networks. Amongst security approaches,...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Implementation of Shortest Path for Networks Topology Using MATLAB

    Communication on interconnection networks is a fundamental problem that has to be solved optimally in order to optimize the usage of a parallel computer. One of the basic communication problems is k-k routing, in which every processing unit, PU, sends and receives exactly k packets. If the distribution of the...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Hierarchical Routing Protocols in Wireless Sensor Network

    As the scale of the network increases, especially wireless and mobile networks come into fashion. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. In this paper, the emphasis is on the study of Hierarchical...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Analysis of Multi-Tier Overlay-Based Next Generation Wireless Networks

    This paper analyzes the overlay model for ubiquitous networking over variety of networks. It proposes architecture for Wireless Overlay Network (WON) supporting seamless mobility across multiple heterogeneous networks. It has proposed a Layer Manager supporting Mobile IP (MIP) protocol for interlayer connectivity. It presents a mathematical model to analyze the...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Back Up Cluster Head Determination Inwireless Sensor Routing Using Supervisory Selection Time Approach

    In Wireless Sensor Network, dynamic cluster based routing protocol approach is mostly used. In this approach, most frequently cluster reelection algorithm is performed due to the energy depletion of cluster heads. This repeated cluster head reelection increases the number of advertisement messages which in turn depletes the energy of overall...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Comprehensive Survey on Intrusion Detection in MANET

    With the progression of computer networks extending boundaries, Mobile Ad hoc NETwork (MANET) has emerged as a new frontier of technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Analysis of Security Issues and Performance Enhancement in Cloud Computing

    The ability to scale a web application or website is tied directly to understanding where the resource constraints lie and what impact the addition of various resources has on the application. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Self Secured Authentication Routing Protocol for Mobile Adhoc Network

    A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for...

    Provided By Kurukshetra University

  • White Papers // Dec 2009

    Comparison of Effectiveness of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Algorithm of Back Propagation Network Implementation in VHDL

    A neural network is a powerful data-modeling tool that is able to capture and represent complex input/output relationships. The motivation for the development of neural network technology stemmed from the desire to develop an artificial system that could perform "Intelligent" tasks similar to those performed by the human brain. An...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Software Engineering Issues From the Cloud Application Perspective

    Any IT application needs a model of computation, a model of storage, and a model of communication. This job is undoubtedly taken care of by Software engineering. This keynote paper: presents a 21st century vision of computing along with the challenges posed towards software engineering and the position of software...

    Provided By Kurukshetra University

  • White Papers // May 2011

    A Beam Scanning UWB Antenna System for Wireless Applications

    Patch antenna is one of the most rapidly popular topics in the antenna field in the past twenty years. In high-performance aircraft, spacecraft, satellite and missile applications, where size, weight, cost, performance, ease of installation, and aerodynamic profile are constraints, and low profile antennas may be required. Electronic Steerable UWB...

    Provided By Kurukshetra University

  • White Papers // Apr 2010

    The Vertical Handoff Algorithm Using Fuzzy Decisions in Cellular Phone Networks

    A new, dynamic, cost effective and efficient Handoff algorithm is the need of the future world of Wireless Communication. The simple Fuzzy decisions can be used to design an effective and efficient Handoff algorithm. Few selected parameters such as Power Level, Cost, and Bandwidth along with the Speed of the...

    Provided By Kurukshetra University

  • White Papers // May 2011

    Fuzzy Controller Based Stable Routes With Lifetime Prediction in MANETs

    In ad hoc networks, the nodes are dynamically and arbitrary located in a manner that the interconnections between nodes are changing frequently. Thus, designing an effective routing protocol is a critical issue. In this paper, the authors propose a fuzzy based routing method that selects the most stable route (FSRS)...

    Provided By Kurukshetra University

  • White Papers // May 2011

    Analytical Modeling of Counter Based Broadcast Scheme in Mobile Ad Hoc Networks

    Broadcasting is a technique used for distribution of control packets in mobile ad hoc networks. Several broadcast schemes were proposed in the literature, among which is the counter-based scheme. However, performance analyses of these schemes were mostly conducted using simulation. Thus, little work has been done on mathematical modeling and...

    Provided By Kurukshetra University

  • White Papers // Aug 2011

    GPS Enabled Energy Efficient Routing for MANET

    In this paper, the authors propose an energy aware reactive approach by introducing energy and distance based threshold criteria. Cross Layer interaction is exploited the performance of physical layer which leads to significant improvement in the energy efficiency of a network. Ad Hoc Networks consist of mobile nodes that self...

    Provided By Kurukshetra University

  • White Papers // Jul 2010

    Performance of Modeling Wireless Networks in Realistic Environment

    A wireless network is realized by mobile devices which communicate over radio channels. Since, experiments of real life problem with real devices are very difficult, simulation is used very often. Among many other important properties that have to be defined for simulative experiments, the mobility model and the radio propagation...

    Provided By Kurukshetra University