Kurukshetra University

Displaying 1-40 of 466 results

  • White Papers // Sep 2014

    Study of Cross-Site Scripting Attacks and Their Countermeasures

    In present-day time, most of the associations are making use of web services for improved services to their clients. With the upturn in count of web users, there is a considerable hike in the web attacks. Thus, security becomes the dominant matter in web applications. The disparate kind of vulnerabilities...

    Provided By Kurukshetra University

  • White Papers // Jan 2014

    Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach

    Today every security expert worries about the security problems and tries to find out the secure solution. Because it is a challenging aspect of communications today which touches many spheres including memory space, processing speed, code development and maintenance issues? The problem, exaggerated when it comes to dealing with lightweight...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Analysis of ANSN Attack on OLSR Based MANETs

    A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing (OLSR) protocol is a route management protocols for such mobile ad hoc networks. This...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Securing E-Commerce

    E-commerce provides an important medium for doing business on global based. E-commerce is the electronic automation of business process. E-commerce has become a critical component in any business competitive strategy. Organizations are gaining opportunities and benefits such as global presence and improved competitiveness from web-based e-commerce. In this paper, the...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Information Security in Grid Computing

    The spread of worldwide networks and the technological trend arc feeding the progress of network and distributed computing in different directions (grid, cloud, autonomic, ubiquitous, pervasive, volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Risk Management in Information Security System

    In information security system there are always some cases which come up with some risks. To handle the risks there must be risk management in information security system. An appropriate risk management process is an extremely critical component of a successful information security program. The main objective of an organization's...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Big Data Analytics Using Hadoop Components Like Pig and Hive

    In big data world, Hadoop Distributed File System (HDFS) is very popular. It provides a framework for storing data in a distributed environment and also has set of tools to retrieve and process. These data set using map-reduce concept. In this paper, a thorough research has been carried to discuss...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Wavelet Based Fingerprint Authentication System

    Fingerprint biometric is very useful in application which requires identity to be claimed. It plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Wavelet analysis and its applications to fingerprint verification is one of the fast growing areas for research in recent...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    A Novel Bayesian Approach Against Phishing Attacks Based on Textual and Visual Content

    Phishing attacks are a major concern for preserving internet users' privacy. By combining social engineering and website forgery techniques, phishing attacks spoof the identity of a company (typically a bank or an auction site), to trick Internet users to reveal confidential information. The perfect phishing attack creates a website very...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Improving the Performance of IDS Using Genetic Algorithm

    Intrusion Detection System (IDS) aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. The growing number of Internet threats increasingly inspires the need of applying a defense in depth concepts to protect worldwide computer system from being intruded for grabbing information. The authors...

    Provided By Kurukshetra University

  • White Papers // Jul 2013

    Potential Covert Channel in Distributed Database

    In today's environment. There is need of distributed database in communication. This paper provides a faster access and remove delays throughout the system .the paper will examine the features of distributed database architecture. The learning of distributed database management system will lead them for successful design. The design will improve...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Mining of Web Server Logs Using Extended Apriori Algorithm

    Association rule mining is one of the most significant techniques in the field of data mining. It is very useful in discovering relationships hidden in large transaction datasets such as frequent patterns, associations etc. One of the popular and important algorithms in this category is Apriori algorithm which finds frequent...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Highly Available XenApp Cloud

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Performance of Flow Based Intrusion Detection System Over Traditional Intrusion Detection in High Speed Network

    The vast growth of 1-10Gbps network technology in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, the authors depend on the Internet in the people daily life for simple tasks such as checking emails, but also for managing private and financial information....

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Acceptability of Fingerprint as Biometric Traits

    Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on \"Who the user is,\" rather than by \"What the users' possesses\" (e.g., an ID card). Among...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    A Survey on Security Challenges of Cloud Computing

    Cloud computing has revolutionized the industry because of its benefits like on-demand services, scalability, elasticity, minimization of capital expenditure, etc. It is not a new concept but a fusion of distributed computing, grid computing, parallel computing and so on. It attracts the small enterprises as it eliminates the requirements for...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Multi Packed Security Addressing Challenges in Cloud Computing

    Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Cloud Computing: Performance Implications and Challenges

    Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Information Management Security in Multiple Networks for Development of Business and E-Commerce

    In this paper, the authors will discuss about Internet which has become the information super highway. The evolving Internet and its related technologies have allowed businesses to communicate in new and strategic ways with various types of people and organizations. Over the years, there have been additions of feature upon...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Detection and Prevention of Wormhole Attack in MANET: A Review

    Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc NETwork (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Survey of Network Intrusion Detection Using K-Mean Algorithm

    Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly and slow. Intrusion detection techniques can be categorizes into irregularity detection and mistreats detection. Anomaly detection systems, for example, IDES Intrusion Detection...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Enhanced Inter-Cloud System Architecture

    Cloud computing gains tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary provided with all the infrastructure facilities that a cloud user needs. But as the no of organizations adopting cloud system increases, the services providers need to ensure availability of various services, infrastructure...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Spoof Attack Detection in Fingerprint Authentication Using Hybrid Fusion

    In the modern era, with the growing need of biometric technologies, spoof attacks are becoming a serious concern. A number of solutions have been proposed to detect the use of fake fingerprints. This paper takes advantage of skin elements in fingerprints, namely: minutiae points and ridge bifurcations to investigate spoof...

    Provided By Kurukshetra University

  • White Papers // Feb 2013

    Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review

    MANET (Mobile Ad-hoc NETwork) refers to a multi-hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANET'S are actually self organizing and adaptive networks that can be formed and deformed...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    Wireless Sensor Networks: Architecture, Protocols

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    A Comprehensive Study of Latest Security Models for MANETs: Covering Intrusion Detection and Denial of Service Attacks

    Mobile Ad-hoc NETworks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET's are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    Analysis of Security Criteria for Partner Network

    The authors are allowing people outside their organization access to proprietary data and applications - over the internet. The objectives of this research are to form a secured infrastructure between partner network and internet. In today's competitive business landscape, organizations are compelled to share data, files, and applications with external...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    The Study of Multimedia Data Model Technology Based on Cloud Computing

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm in which resources...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Oct 2012

    Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, Routing is one of the central requirements. Due to non central control, security is the major issue in...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing Security and Privacy Concerns

    In last few years, cloud computing concept has groomed a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Now, recession-hit companies have acknowledged that simply by shifting...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    GLAAR: Geographic Location Aware Adaptive Routing in Mobile Ad Hoc Networks (MANETs)

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring, wireless, low range/power, mobile infrastructure less network where each participating node itself manages the communication over the network. Node Location information may reduce the overall communication overhead for packet forwarding in Mobile Ad-Hoc NETworks (MANETs). This paper proposes a novel Geographic Location...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Analysis of Resilient Back-Propagation for Improving Software Process Control

    In this paper, the authors present the application of the neural network for the identification of Reusable Software modules in Oriented Software System. Metrics are used for the structural analysis of the different procedures. The values of Metrics will become the input dataset for the neural network systems. Training Algorithm...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    How Cloud Computing Will Affect College Libraries

    Past few years concept of cloud computing libraries become very popular. Even countries which are affected by recession started recognizing that by computer clouding fast access to data will enhance there productivity. Data and information about libraries can be placed in the cloud. In this paper, the authors will study...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Distributed Power Control With Energy Efficient Forwarding Routing Protocol for Wireless Sensor Network

    In wireless sensor network, to prolong the lifetime of the Sensor network, low power consumption is needed which can be obtained by facilitating low duty cycle and local signal processing. Thus a power control mechanism has to be designed and used to minimize the energy consumption. In addition to this,...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Prioritized Region Scheduling Based QoS Routing Over WMSN

    In this paper, the authors have proposed Prioritized Region Scheduling based Optimal Image Routing (PRSOIR) which optimally transmit image over wireless sensor network. Multiple paths are built and are scored using path conditions based on availability of resources along the paths. The proposed scheme is compared with non-optimal scheme that...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Implementation of Back Propagation Algorithm Using MATLAB

    Artificial Neural Network (ANN) are highly interconnected and highly parallel systems. Back Propagation is a common method of training artificial neural networks so as to minimize objective function. This paper describes the implementation of back propagation algorithm. The error generated at the output is fed back to the input and...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Comparative Study of Traffic Padding Schemes to Prevent Traffic Analysis in Sensor Networks

    Wireless networks are envisioned to consist of large number of inexpensive and small nodes with sensing, data processing, and communication capabilities which are densely deployed in a region of interest and collaborate to accomplish a common task. One main challenge in design of these networks is their vulnerability to security...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Safe Computing in the Era of Cyber Crime

    Life on the internet is a different experience. There are many parties who are interested in who the people are and what they do on the Web, all with different intentions. It is because of this that initiatives such as the Electronic Privacy Information Center (EPIC) and the World Wide...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Proposed Protocol for Hash-Secured Routing in Ad Hoc Networks

    A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been...

    Provided By Kurukshetra University

  • White Papers // Jul 2010

    Ranking Web-Services Based on QoS for Best-Fit Search

    While creating web applications using web service technology, there is a need for selecting a web service which best suits the need of application. As the number of web services available over the web has increased, the service consumers are always offered large number of services performing similar functionality. There...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Software Design Simulation for Quick and Qualitative Application Development

    Software design simulation is a quick solution to qualitative application development. As one knows, the prime objective of every software development organization is to reach the stage of quick and qualitative software development. The paper presents a new approach to achieve this stage. This approach stores the design document in...

    Provided By Kurukshetra University

  • White Papers // Oct 2009

    Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energy Parameters

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // Jan 2010

    Unicast and Multicast Routing Protocols for MANETs: A Comparative Survey

    A Mobile Ad-hoc Network (MANET) is a selfconfiguring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Energy Efficient Routing in mobile Ad Hoc network with Capacity Maximization

    A mobile ad hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Mobile ad-hoc networks are the autonomous systems of mobile nodes forming network in the absence of...

    Provided By Kurukshetra University

  • White Papers // Aug 2010

    A Survey of Routing Protocols in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETwork (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in...

    Provided By Kurukshetra University

  • White Papers // Jul 2010

    A Comparative Study for Secure Routing in MANET

    In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Power Optimization in Mobile Ad Hoc Network

    A mobile ad hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Mobile ad-hoc networks are the autonomous systems of mobile nodes forming network in the absence of...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Enhancing the Performance of a Nodes in Ad-Hoc Networks Using Mobile Relay

    Nodes in Ad-hoc Networks are battery powered and hence have limited life time. Due to excessive utilization a node may die which can result in energy depletion problem and thereby affect overall network performance. Local rate of energy consumption on a node can be monitored. The authors can estimate the...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Wearable Computingand Related Issues

    A wearable computer is a small portable computer that is designed to be worn on the body during its use. Wearable computers are usually either integrated into the user's clothing or can be attached to the body through some other means, like a wristwatch and hands-free cell phone. A wearable...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Artificial Intelligence - Man or Machine

    Artificial intelligence conceived either as an attempt to provide models of human cognition or as the development of programs able to perform intelligent tasks, is primarily interested in the uses of language. This paper is not related to any specific research but it covers the problem solving and various AI...

    Provided By Kurukshetra University

  • White Papers // Nov 2010

    IEEE WLANs Standards for Mobile Ad-Hoc Networks (MANETs): Performance Analysis

    Mobile Ad hoc NETworks(MANETs) catch the great attention of researchers because of its unique characteristics like independent of infrastructure, dynamic topology behavior, limited energy source, multihop routing, mobility of nodes etc. All these characteristics chase lots of challenges about security, reliability and performance issues. In this paper the authors present...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Analyzing WLANs Standards for Wireless Sensor Network

    Wireless sensor network is a special kind of wireless network, design to communicate with distributes wireless nodes (Which supplies the information). Data collection from leaf sensor node to the central node for manipulation and prepare into information in useful format to the next observer node. Wireless sensor network may adopt...

    Provided By Kurukshetra University

  • White Papers // Sep 2010

    Network Reliability Computation by Using Different Binary Decision Diagrams

    In this Paper the authors consider three different types of variable ordering; namely optimal ordering, good ordering and bad ordering for constructing the BDD of a given network by applying three different heuristics. This classification is based on the size of the BDD, because the size of the BDD strongly...

    Provided By Kurukshetra University

  • White Papers // Sep 2010

    Design and Performance Analysis of Coordinated Checkpointing Algorithms for Distributed Mobile Systems

    Checkpointing is an efficient fault tolerance technique used in distributed systems. Mobile computing raises many new issues, such as high mobility, lack of stable storage on Mobile Hosts (MHs), low bandwidth of wireless channels, limited battery life and disconnections that make the traditional checkpointing protocols unsuitable for such systems. Several...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    A Novel Mobile Crawler System Based on Filtering Off Non-Modified Pages for Reducing Load on the Network

    The studies in the literature show that about 40% of the current Internet traffic and bandwidth consumption is due to web crawlers that retrieve pages for indexing by the different search engines. This traffic and bandwidth consumption will increase in future due to the exponential growth of the web. This...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Circular Patch Antenna With Enhanced Bandwidth Using Narrow Rectangular Slit for Wi-Max Application

    Since the inception of microstrip patch antenna constant efforts are being made to modify the overall performance of this class of antenna field. Although the microstrip antenna has some of shortcoming till this date such as low gain, narrow operating bandwidth, poor radiation efficiency, yet it has been one the...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobility Management Protocols for Wireless Mobile Networks

    4 G wireless networks are envisioned to provide high raw data rates in the downlink as well as in the uplink directions. These networks are driven by the need to support context-rich multimedia services and applications. 4G wireless networks also support global roaming and multiple classes of services with variable...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Comparision of Approaches to Implement Intrusion Detection System

    An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. Intrusion detection system alerts the system administrators...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Design Issues: Duty Cycle Control in Wireless Sensor Networks

    Wireless sensor networks are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Wireless Sensor Networks (WSN's) are becoming popular in military and civilian applications such as surveillance, monitoring, disaster recovery, home automation and many others. Almost any sensor network application faces the...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    A Survey and Performance Analysis of Checkpointing and Recovery Schemes for Mobile Computing Systems

    Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the status information. Checkpointing is a process of saving status information. Mobile computing systems often suffer from high failure rates that are transient and independent in nature. To add reliability...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Bluetooth Quality Issues, Threats and Security Tips

    The Bluetooth, LAN's and IrDA technology is a boon of the present era. It's a part of wireless communication as well as mobile communication. Bluetooth use low power and generally do not require a license for spectrum use LAN is a technology for data transfer providing data rates up to...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobile Cloud Computing as a Future of Mobile Multimedia Database

    Most of the people use their mobile phones as mini-computers that travel with them and keep them connected 24 hours a day, and that number will surely continue to grow. Mobiles are now integral part of business world and importance of mobile database is inevitable. A new study from ABI...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Cooperative Diversity and Partner Selection Techniques in Wireless Networks

    Mobile users' quality of service is limited by the fading problem. In fading, within the duration of any given call, mobile users experience severe variations in signal attenuation. Solution to this problem is the use of some type of spatial diversity. Spatial diversity generally requires more than one antenna at...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    How to Secure Information Flow in Web Based Mobile Ad Hoc Network

    The emergence of the Mobile Ad Hoc NETworking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors,...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Location Update Strategies in Mobile Computing

    Managing location information of mobile devices is a very much important task in mobile computing systems. There is always a trade-off occurs when the location of the device will be updated (when the device is in moving condition) and the device sending effort. Here, the authors will follow dynamic location...

    Provided By Kurukshetra University

  • White Papers // May 2010

    Multipath Routing Protocol With Backtracking for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is characterized by multi-hop wireless links in the absence of cellular infrastructure and frequent host mobility. In this paper, a new on-demand routing protocol is proposed, named On-demand Routing protocol with Backtracking (ORB), for multi-hop mobile ad hoc networks. Suppose a source host wants...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Dynamic Frequency Allocation Scheme of Mobile Networks Using Priority Assignment Technique

    Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate effectively avoiding interference with licensed or unlicensed users. Cognitive radio techniques provide the capability to use or share the spectrum in an opportunistic manner. In...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Design of Simulator for Reliability Estimation of Component Based Software System

    This is the age of Rapid Application Development (RAD). To achieve the goal of RAD, Component Based Software Development (CBSD) can be of great help. Here Commercial-Off-The-Shelf (COTS) components are deployed together to make a larger application. These components are designed and developed independent of each other and independent of...

    Provided By Kurukshetra University

  • White Papers // May 2011

    Making Ad Hoc Network Stable, Secured and Energy Efficient

    Mobile Ad hoc networking is a challenging task due to the lack of resources in the network as well as the frequent changes in the network topology. Although lots of research has been done on supporting QoS in the Internet and other networks, they are not suitable for mobile Ad...

    Provided By Kurukshetra University

  • White Papers // Jan 2010

    Node Disjoint Multipath Routing Considering Link and Node Stability Protocol: A Characteristic Evaluation

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // May 2011

    A Multi-Layer Real Time Remote Monitoring & Corporate Network System for Virulent Threats

    Corporations face a dangerous threat that existing security technologies do not adequately address, which includes malware, trackware and adware, describes any program that may track online and/or offline PC activity and locally saves or transmits those findings to third parties without user's knowledge or consent. The same activities that make...

    Provided By Kurukshetra University

  • White Papers // Nov 2010

    SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Quality of Service Routing in Mobile Ad Hoc Networks Considering Lifetime and Energy Predictions With Traffic Distribution

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Performance Comparison of Energy Efficient AODV Protocols

    A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multiple alternate paths. Routing in MANET is a critical task due to highly dynamic environment....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Self Secured Authentication Routing Protocol for Mobile Adhoc Network

    A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for...

    Provided By Kurukshetra University

  • White Papers // Dec 2009

    Comparison of Effectiveness of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks

    Mobile Ad hoc NETworks (MANET) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self organize into arbitrary and temporary ad hoc network topologies. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies....

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Algorithm of Back Propagation Network Implementation in VHDL

    A neural network is a powerful data-modeling tool that is able to capture and represent complex input/output relationships. The motivation for the development of neural network technology stemmed from the desire to develop an artificial system that could perform "Intelligent" tasks similar to those performed by the human brain. An...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Software Engineering Issues From the Cloud Application Perspective

    Any IT application needs a model of computation, a model of storage, and a model of communication. This job is undoubtedly taken care of by Software engineering. This keynote paper: presents a 21st century vision of computing along with the challenges posed towards software engineering and the position of software...

    Provided By Kurukshetra University