Kurukshetra University

Displaying 1-40 of 466 results

  • White Papers // Sep 2014

    Study of Cross-Site Scripting Attacks and Their Countermeasures

    In present-day time, most of the associations are making use of web services for improved services to their clients. With the upturn in count of web users, there is a considerable hike in the web attacks. Thus, security becomes the dominant matter in web applications. The disparate kind of vulnerabilities...

    Provided By Kurukshetra University

  • White Papers // Jan 2014

    Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach

    Today every security expert worries about the security problems and tries to find out the secure solution. Because it is a challenging aspect of communications today which touches many spheres including memory space, processing speed, code development and maintenance issues? The problem, exaggerated when it comes to dealing with lightweight...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Securing E-Commerce

    E-commerce provides an important medium for doing business on global based. E-commerce is the electronic automation of business process. E-commerce has become a critical component in any business competitive strategy. Organizations are gaining opportunities and benefits such as global presence and improved competitiveness from web-based e-commerce. In this paper, the...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Information Security in Grid Computing

    The spread of worldwide networks and the technological trend arc feeding the progress of network and distributed computing in different directions (grid, cloud, autonomic, ubiquitous, pervasive, volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Risk Management in Information Security System

    In information security system there are always some cases which come up with some risks. To handle the risks there must be risk management in information security system. An appropriate risk management process is an extremely critical component of a successful information security program. The main objective of an organization's...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Analysis of ANSN Attack on OLSR Based MANETs

    A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing (OLSR) protocol is a route management protocols for such mobile ad hoc networks. This...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Big Data Analytics Using Hadoop Components Like Pig and Hive

    In big data world, Hadoop Distributed File System (HDFS) is very popular. It provides a framework for storing data in a distributed environment and also has set of tools to retrieve and process. These data set using map-reduce concept. In this paper, a thorough research has been carried to discuss...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Wavelet Based Fingerprint Authentication System

    Fingerprint biometric is very useful in application which requires identity to be claimed. It plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Wavelet analysis and its applications to fingerprint verification is one of the fast growing areas for research in recent...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    A Novel Bayesian Approach Against Phishing Attacks Based on Textual and Visual Content

    Phishing attacks are a major concern for preserving internet users' privacy. By combining social engineering and website forgery techniques, phishing attacks spoof the identity of a company (typically a bank or an auction site), to trick Internet users to reveal confidential information. The perfect phishing attack creates a website very...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Improving the Performance of IDS Using Genetic Algorithm

    Intrusion Detection System (IDS) aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. The growing number of Internet threats increasingly inspires the need of applying a defense in depth concepts to protect worldwide computer system from being intruded for grabbing information. The authors...

    Provided By Kurukshetra University

  • White Papers // Jul 2013

    Potential Covert Channel in Distributed Database

    In today's environment. There is need of distributed database in communication. This paper provides a faster access and remove delays throughout the system .the paper will examine the features of distributed database architecture. The learning of distributed database management system will lead them for successful design. The design will improve...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Mining of Web Server Logs Using Extended Apriori Algorithm

    Association rule mining is one of the most significant techniques in the field of data mining. It is very useful in discovering relationships hidden in large transaction datasets such as frequent patterns, associations etc. One of the popular and important algorithms in this category is Apriori algorithm which finds frequent...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Highly Available XenApp Cloud

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Performance of Flow Based Intrusion Detection System Over Traditional Intrusion Detection in High Speed Network

    The vast growth of 1-10Gbps network technology in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, the authors depend on the Internet in the people daily life for simple tasks such as checking emails, but also for managing private and financial information....

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    A Survey on Security Challenges of Cloud Computing

    Cloud computing has revolutionized the industry because of its benefits like on-demand services, scalability, elasticity, minimization of capital expenditure, etc. It is not a new concept but a fusion of distributed computing, grid computing, parallel computing and so on. It attracts the small enterprises as it eliminates the requirements for...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Acceptability of Fingerprint as Biometric Traits

    Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on \"Who the user is,\" rather than by \"What the users' possesses\" (e.g., an ID card). Among...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Cloud Computing: Performance Implications and Challenges

    Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Multi Packed Security Addressing Challenges in Cloud Computing

    Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Information Management Security in Multiple Networks for Development of Business and E-Commerce

    In this paper, the authors will discuss about Internet which has become the information super highway. The evolving Internet and its related technologies have allowed businesses to communicate in new and strategic ways with various types of people and organizations. Over the years, there have been additions of feature upon...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Detection and Prevention of Wormhole Attack in MANET: A Review

    Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc NETwork (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Survey of Network Intrusion Detection Using K-Mean Algorithm

    Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly and slow. Intrusion detection techniques can be categorizes into irregularity detection and mistreats detection. Anomaly detection systems, for example, IDES Intrusion Detection...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Enhanced Inter-Cloud System Architecture

    Cloud computing gains tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary provided with all the infrastructure facilities that a cloud user needs. But as the no of organizations adopting cloud system increases, the services providers need to ensure availability of various services, infrastructure...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Spoof Attack Detection in Fingerprint Authentication Using Hybrid Fusion

    In the modern era, with the growing need of biometric technologies, spoof attacks are becoming a serious concern. A number of solutions have been proposed to detect the use of fake fingerprints. This paper takes advantage of skin elements in fingerprints, namely: minutiae points and ridge bifurcations to investigate spoof...

    Provided By Kurukshetra University

  • White Papers // Feb 2013

    Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review

    MANET (Mobile Ad-hoc NETwork) refers to a multi-hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANET'S are actually self organizing and adaptive networks that can be formed and deformed...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    A Comprehensive Study of Latest Security Models for MANETs: Covering Intrusion Detection and Denial of Service Attacks

    Mobile Ad-hoc NETworks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET's are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    Wireless Sensor Networks: Architecture, Protocols

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    Analysis of Security Criteria for Partner Network

    The authors are allowing people outside their organization access to proprietary data and applications - over the internet. The objectives of this research are to form a secured infrastructure between partner network and internet. In today's competitive business landscape, organizations are compelled to share data, files, and applications with external...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    The Study of Multimedia Data Model Technology Based on Cloud Computing

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm in which resources...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Oct 2012

    Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, Routing is one of the central requirements. Due to non central control, security is the major issue in...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing Security and Privacy Concerns

    In last few years, cloud computing concept has groomed a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Now, recession-hit companies have acknowledged that simply by shifting...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Text Mining: How to Mining Knowledge From Text

    An important approach to text mining involves the use of natural-language information extraction. Information Extraction (IE) distills structured data or knowledge from un-structured text by identifying references to named entities as well as stated relationships between such entities. IE systems can be used to directly extricate abstract knowledge from a...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A 3-Tier Heterogeneous Secure Routing Protocol for Wireless Sensor Network

    Security is very critical parameter in sensor networks. Securing the WSN needs to make the network support every security property. Security attack is a concern for wireless sensor networks because of usage of very low capacity devices in the systems and physical accessibility to sensor nodes. Therefore to prevent confidential...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Fuzzy Model for Object Oriented Testability & Its Performance

    For large software systems, the testing phase tends to have comparatively much higher cost than all the previous life-cycle phases taken together, obviously resulting in much more efforts. A good measure of software testability can help better manage the testing phase effort. This paper proposes a fuzzy model for measurement...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Novel Approach for Software Inspection

    Michael Fagan introduced the software inspection process in the early 1970s. The Fagan inspection method, a formalization of review process is based on the application of process management techniques to software development. In this paper, the authors discuss techniques based on strongest post-condition predicates transformer (sp). They identify problems with...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Framework for Enhancing Security and Performance in Multi-Tenant Applications

    The ability to scale a web application or website is tied directly to understanding where the resource constraints lie and what impact the addition of various resources has on the application. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Implementation of Public Key Cryptographic System: RSA

    In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA system generally belongs to the category of PKCS. RSA encryption is one of the public-key methods that have been...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Security Issues of Banking Adopting the Application of Cloud Computing

    Cloud computing has become the most emerging technology now a days. It increases the flexibility scalability over internet. Every field wants to do work with the help of cloud computing because it provides promising business idea to the fastest growing areas of the information technology. One of the fields that...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Systematic Way of Affine Transformation Using Image Registration

    Image registration is the process of transforming the different sets of data into one coordinate system. Registration is necessary in order to be able to compare or integrate the data obtained from different measurements such as different viewpoints, different times, and different sensors, etc. Image Registration is a crucial step...

    Provided By Kurukshetra University

  • White Papers // Nov 2010

    SD-AODV: A Protocol for Secure and Dynamic Data Dissemination in Mobile Ad Hoc Network

    Security remains as a major concern in the mobile ad hoc networks. This paper presents a new protocol SD-AODV, which is an extension of the exiting protocol AODV. The proposed protocol is made secure and dynamic against three main types of routing attacks-wormhole attack, byzantine attack and blackhole attack. SD-AODV...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Quality of Service Routing in Mobile Ad Hoc Networks Considering Lifetime and Energy Predictions With Traffic Distribution

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // May 2011

    Making Ad Hoc Network Stable, Secured and Energy Efficient

    Mobile Ad hoc networking is a challenging task due to the lack of resources in the network as well as the frequent changes in the network topology. Although lots of research has been done on supporting QoS in the Internet and other networks, they are not suitable for mobile Ad...

    Provided By Kurukshetra University

  • White Papers // May 2011

    A Multi-Layer Real Time Remote Monitoring & Corporate Network System for Virulent Threats

    Corporations face a dangerous threat that existing security technologies do not adequately address, which includes malware, trackware and adware, describes any program that may track online and/or offline PC activity and locally saves or transmits those findings to third parties without user's knowledge or consent. The same activities that make...

    Provided By Kurukshetra University

  • White Papers // Jan 2010

    Node Disjoint Multipath Routing Considering Link and Node Stability Protocol: A Characteristic Evaluation

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobility Management Protocols for Wireless Mobile Networks

    4 G wireless networks are envisioned to provide high raw data rates in the downlink as well as in the uplink directions. These networks are driven by the need to support context-rich multimedia services and applications. 4G wireless networks also support global roaming and multiple classes of services with variable...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Comparision of Approaches to Implement Intrusion Detection System

    An IDS can be a piece of installed software or a physical appliance that monitors network traffic in order to detect unwanted activity and events such as illegal and malicious traffic, traffic that violates security policy, and traffic that violates acceptable use policies. Intrusion detection system alerts the system administrators...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Design Issues: Duty Cycle Control in Wireless Sensor Networks

    Wireless sensor networks are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Wireless Sensor Networks (WSN's) are becoming popular in military and civilian applications such as surveillance, monitoring, disaster recovery, home automation and many others. Almost any sensor network application faces the...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    A Survey and Performance Analysis of Checkpointing and Recovery Schemes for Mobile Computing Systems

    Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the status information. Checkpointing is a process of saving status information. Mobile computing systems often suffer from high failure rates that are transient and independent in nature. To add reliability...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Bluetooth Quality Issues, Threats and Security Tips

    The Bluetooth, LAN's and IrDA technology is a boon of the present era. It's a part of wireless communication as well as mobile communication. Bluetooth use low power and generally do not require a license for spectrum use LAN is a technology for data transfer providing data rates up to...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Mobile Cloud Computing as a Future of Mobile Multimedia Database

    Most of the people use their mobile phones as mini-computers that travel with them and keep them connected 24 hours a day, and that number will surely continue to grow. Mobiles are now integral part of business world and importance of mobile database is inevitable. A new study from ABI...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Cooperative Diversity and Partner Selection Techniques in Wireless Networks

    Mobile users' quality of service is limited by the fading problem. In fading, within the duration of any given call, mobile users experience severe variations in signal attenuation. Solution to this problem is the use of some type of spatial diversity. Spatial diversity generally requires more than one antenna at...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    How to Secure Information Flow in Web Based Mobile Ad Hoc Network

    The emergence of the Mobile Ad Hoc NETworking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors,...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Location Update Strategies in Mobile Computing

    Managing location information of mobile devices is a very much important task in mobile computing systems. There is always a trade-off occurs when the location of the device will be updated (when the device is in moving condition) and the device sending effort. Here, the authors will follow dynamic location...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Circular Patch Antenna With Enhanced Bandwidth Using Narrow Rectangular Slit for Wi-Max Application

    Since the inception of microstrip patch antenna constant efforts are being made to modify the overall performance of this class of antenna field. Although the microstrip antenna has some of shortcoming till this date such as low gain, narrow operating bandwidth, poor radiation efficiency, yet it has been one the...

    Provided By Kurukshetra University

  • White Papers // May 2010

    Multipath Routing Protocol With Backtracking for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is characterized by multi-hop wireless links in the absence of cellular infrastructure and frequent host mobility. In this paper, a new on-demand routing protocol is proposed, named On-demand Routing protocol with Backtracking (ORB), for multi-hop mobile ad hoc networks. Suppose a source host wants...

    Provided By Kurukshetra University

  • White Papers // Nov 2009

    Dynamic Frequency Allocation Scheme of Mobile Networks Using Priority Assignment Technique

    Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate effectively avoiding interference with licensed or unlicensed users. Cognitive radio techniques provide the capability to use or share the spectrum in an opportunistic manner. In...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Proposed Protocol for Hash-Secured Routing in Ad Hoc Networks

    A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been...

    Provided By Kurukshetra University

  • White Papers // Dec 2009

    An Efficient and Secured Data Gathering Using Data Aggregation Technique in Wireless Sensor Network

    In Wireless Sensor Network (WSN) security issue, data confidentiality, integrity, and elimination of data redundancy becomes vital, when the sensor network is deployed in a hostile environment. In this hostile environment there is requirement of efficient and secured data gathering of sensed data and forward that data to the required...

    Provided By Kurukshetra University

  • White Papers // Dec 2009

    Defense Mechanisms Against Hello Flood Attack in Wireless Sensor Network

    In a large-scale sensor network individual sensors are subject to security compromise. Where the nature of communication is broadcast and, hence, an attacker can overhear messages posted by any sensor node; security is an important issue here. In this paper, the authors consider Wireless Sensor Network (WSN) security and focus...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Software Design Simulation for Quick and Qualitative Application Development

    Software design simulation is a quick solution to qualitative application development. As one knows, the prime objective of every software development organization is to reach the stage of quick and qualitative software development. The paper presents a new approach to achieve this stage. This approach stores the design document in...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Security in Virtual Machine is Better Than Real Machine

    This position paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine. This structure enables services to be added below the operating system and to do so without trusting or modifying the operating system or applications. To demonstrate the usefulness...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Performance Analysis of Multicast Protocols: ODMRP, PUMA and OBAMP

    Mobile Ad-hoc NETwork (MANET) is a dynamically reconfigurable wireless network without any centralized administration or infrastructure. Here each node acts as a router for each other nodes. Multicasting is the transmission of datagram's to a group of nodes identified by a single destination address. This paper analyzes the performance of...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Two-Stage Algorithm for Subcarrier, Bit and Power Allocation in OFDMA Systems

    Orthogonal Frequency Division Multiple Access (OFDMA) is considered as a modulation and multiple access method for fourth generation wireless networks. This scheme tries to minimize the required transmit power while satisfying the rate requirement and data error rate constraint of each user. It is based on the assumption of knowing...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Wireless Sensor Network for Coastal Erosion: A National Perspective

    Wireless Sensor Networks (WSNs) are one of the research areas in 21st century, which provide platform to scientists with the capability of developing real-time monitoring systems. This paper discusses the development of a WSN to detect coastal erosions, which includes the design, development and implementation of a WSN for real...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Comparative Study of Application Portability With Virtualization Softwares

    Virtualization is a proven software technology that is rapidly transforming the IT landscape and fundamentally changing the way that people compute. Different virtual machines can run different operating systems and multiple applications on the same physical computer. Virtualization is a framework or methodology of dividing the resources of a computer...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Design and Implementation of Probe Fed Equilateral Triangular Patch Microstrip Antenna for Wireless Communications

    The patch of the microstrip antennas can have different geometries such as rectangular, circular, elliptic, squares and triangular. The present paper is about design and fabrication of triangular microstrip antenna. The S is investigated and optimization is performed by varying the feed position and substrate dielectric constant. The ETMA has...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Impact of Relay Nodes on Vehicular Delay Tolerant Network

    Vehicular Delay Tolerant Networks (VDTNs) are networks in which no simultaneous end-to-end path exists. Typically, message delivery experiences long delays due to the disconnected nature of the network. In this type of network the authors' main goal is to deliver the messages to the destination. In this paper, they use...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Fuzzy Based Congestion Control in Wireless Network

    The tremendous growth of wireless networks demands the need to meet different multimedia (such as voice, audio, video, data, etc) applications available over the network. This application demand and allocation could lead to congestion if the network has to maintain such high resources for the quality of service requirements of...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Wi-Fi(802.11) Security Issues and Its Solution

    802.11 wireless LANs continue to gain market momentum. Higher speeds, larger bandwidth and improved quality of service are helping businesses realize the potential business benefits that wireless networking delivers. Now, with this growing adoption of 802.11 wireless LANs, security has become a focal point regarding the decision to deploy a...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Investigation on Throughput of a Multi Hop Network With Identical Station for Random Failure

    In Multi-hop networks stations may pump more traffic into the networks that can be supported, resulting in high packet-loss rate, re-routing instability unfairness and random failures problems due to this effect system efficiency. In this paper formulae has been used for numerical simulation from, by using this formulae, the authors...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Performance Evaluation and Simulation Based Modeling of Energy Aware Variable Range DSR (VRDSR) Protocol

    Energy management is an important issue in Mobile Ad hoc NETworks (MANETs). Normally MANETs use common transmission range for data transfer. Transmitting with high power improves network performance by reducing the number of forwarding nodes. However, it results in interference and decreases network lifetime. The authors have tried variable range...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Implementation of Shortest Path for Networks Topology Using MATLAB

    Communication on interconnection networks is a fundamental problem that has to be solved optimally in order to optimize the usage of a parallel computer. One of the basic communication problems is k-k routing, in which every processing unit, PU, sends and receives exactly k packets. If the distribution of the...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Hierarchical Routing Protocols in Wireless Sensor Network

    As the scale of the network increases, especially wireless and mobile networks come into fashion. Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. In this paper, the emphasis is on the study of Hierarchical...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Analysis of Multi-Tier Overlay-Based Next Generation Wireless Networks

    This paper analyzes the overlay model for ubiquitous networking over variety of networks. It proposes architecture for Wireless Overlay Network (WON) supporting seamless mobility across multiple heterogeneous networks. It has proposed a Layer Manager supporting Mobile IP (MIP) protocol for interlayer connectivity. It presents a mathematical model to analyze the...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Back Up Cluster Head Determination Inwireless Sensor Routing Using Supervisory Selection Time Approach

    In Wireless Sensor Network, dynamic cluster based routing protocol approach is mostly used. In this approach, most frequently cluster reelection algorithm is performed due to the energy depletion of cluster heads. This repeated cluster head reelection increases the number of advertisement messages which in turn depletes the energy of overall...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Comprehensive Survey on Intrusion Detection in MANET

    With the progression of computer networks extending boundaries, Mobile Ad hoc NETwork (MANET) has emerged as a new frontier of technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Analysis of Security Issues and Performance Enhancement in Cloud Computing

    The ability to scale a web application or website is tied directly to understanding where the resource constraints lie and what impact the addition of various resources has on the application. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Self Secured Authentication Routing Protocol for Mobile Adhoc Network

    A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Wireless Sensor for Effective Network Security Mechanism

    As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. The deployment of security solutions...

    Provided By Kurukshetra University