Kurukshetra University

Displaying 1-40 of 449 results

  • White Papers // Sep 2014

    Study of Cross-Site Scripting Attacks and Their Countermeasures

    In present-day time, most of the associations are making use of web services for improved services to their clients. With the upturn in count of web users, there is a considerable hike in the web attacks. Thus, security becomes the dominant matter in web applications. The disparate kind of vulnerabilities...

    Provided By Kurukshetra University

  • White Papers // Jan 2014

    Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach

    Today every security expert worries about the security problems and tries to find out the secure solution. Because it is a challenging aspect of communications today which touches many spheres including memory space, processing speed, code development and maintenance issues? The problem, exaggerated when it comes to dealing with lightweight...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Analysis of ANSN Attack on OLSR Based MANETs

    A MANET is a multi-hop ad-hoc wireless network where nodes can move arbitrary in the topology. The network has no given infrastructure and can be set up quickly in any environment. The Optimized Link State Routing (OLSR) protocol is a route management protocols for such mobile ad hoc networks. This...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Securing E-Commerce

    E-commerce provides an important medium for doing business on global based. E-commerce is the electronic automation of business process. E-commerce has become a critical component in any business competitive strategy. Organizations are gaining opportunities and benefits such as global presence and improved competitiveness from web-based e-commerce. In this paper, the...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Information Security in Grid Computing

    The spread of worldwide networks and the technological trend arc feeding the progress of network and distributed computing in different directions (grid, cloud, autonomic, ubiquitous, pervasive, volunteer, etc). With regard to information, great amount of data widely (geographically) spread over the network require adequate management, to ensure availability for authorized...

    Provided By Kurukshetra University

  • White Papers // Dec 2013

    Risk Management in Information Security System

    In information security system there are always some cases which come up with some risks. To handle the risks there must be risk management in information security system. An appropriate risk management process is an extremely critical component of a successful information security program. The main objective of an organization's...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Big Data Analytics Using Hadoop Components Like Pig and Hive

    In big data world, Hadoop Distributed File System (HDFS) is very popular. It provides a framework for storing data in a distributed environment and also has set of tools to retrieve and process. These data set using map-reduce concept. In this paper, a thorough research has been carried to discuss...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Wavelet Based Fingerprint Authentication System

    Fingerprint biometric is very useful in application which requires identity to be claimed. It plays a very important role in forensic applications like criminal investigations, terrorist identification and National security issues. Wavelet analysis and its applications to fingerprint verification is one of the fast growing areas for research in recent...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    A Novel Bayesian Approach Against Phishing Attacks Based on Textual and Visual Content

    Phishing attacks are a major concern for preserving internet users' privacy. By combining social engineering and website forgery techniques, phishing attacks spoof the identity of a company (typically a bank or an auction site), to trick Internet users to reveal confidential information. The perfect phishing attack creates a website very...

    Provided By Kurukshetra University

  • White Papers // Sep 2013

    Improving the Performance of IDS Using Genetic Algorithm

    Intrusion Detection System (IDS) aim to detect computer attacks and/or computer misuse, and to alert the proper individuals upon detection. The growing number of Internet threats increasingly inspires the need of applying a defense in depth concepts to protect worldwide computer system from being intruded for grabbing information. The authors...

    Provided By Kurukshetra University

  • White Papers // Aug 2013

    VADA - Veracity Aware Defence Algorithm for Cloud Computing Environment

    Security is one of the most exigent ongoing research areas in cloud computing as data owner stores the susceptible data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. This paper proposed a new algorithm VADA (Veracity...

    Provided By Kurukshetra University

  • White Papers // Jul 2013

    Potential Covert Channel in Distributed Database

    In today's environment. There is need of distributed database in communication. This paper provides a faster access and remove delays throughout the system .the paper will examine the features of distributed database architecture. The learning of distributed database management system will lead them for successful design. The design will improve...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Mining of Web Server Logs Using Extended Apriori Algorithm

    Association rule mining is one of the most significant techniques in the field of data mining. It is very useful in discovering relationships hidden in large transaction datasets such as frequent patterns, associations etc. One of the popular and important algorithms in this category is Apriori algorithm which finds frequent...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Highly Available XenApp Cloud

    In Cloud computing, application and desktop delivery are the two emerging technologies that has reduced application and desktop computing costs and provided greater IT and user flexibility compared to traditional application and desktop management models. Among the various SaaS technologies, XenApp that allow numerous end users to connect to their...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Performance of Flow Based Intrusion Detection System Over Traditional Intrusion Detection in High Speed Network

    The vast growth of 1-10Gbps network technology in recent years paved the way to a flourishing landscape of new, high-bandwidth Internet services. As users, the authors depend on the Internet in the people daily life for simple tasks such as checking emails, but also for managing private and financial information....

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    Acceptability of Fingerprint as Biometric Traits

    Biometric recognition or, simply, biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on \"Who the user is,\" rather than by \"What the users' possesses\" (e.g., an ID card). Among...

    Provided By Kurukshetra University

  • White Papers // Jun 2013

    A Survey on Security Challenges of Cloud Computing

    Cloud computing has revolutionized the industry because of its benefits like on-demand services, scalability, elasticity, minimization of capital expenditure, etc. It is not a new concept but a fusion of distributed computing, grid computing, parallel computing and so on. It attracts the small enterprises as it eliminates the requirements for...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Multi Packed Security Addressing Challenges in Cloud Computing

    Cloud computing efficiency, flexibility, greater agility, less capital expenditure is to overcome geographic limitations to compete in a global market. Most of the companies are shifting to Cloud based services, but at the same time they are concerned about the security risks. Hopefully after the definitions and illustrations of Cloud...

    Provided By Kurukshetra University

  • White Papers // May 2013

    Cloud Computing: Performance Implications and Challenges

    Cloud computing is a new paradigm in the field of distributed computing. The objective of cloud computing is to provide various computing resources over the internet in the form of service to number of cloud consumers. Cloud provides the computing environment to organization in a cost effective manner and give...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Information Management Security in Multiple Networks for Development of Business and E-Commerce

    In this paper, the authors will discuss about Internet which has become the information super highway. The evolving Internet and its related technologies have allowed businesses to communicate in new and strategic ways with various types of people and organizations. Over the years, there have been additions of feature upon...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Detection and Prevention of Wormhole Attack in MANET: A Review

    Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc NETwork (MANET) is an infrastructure less self-configured collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. Security has become a primary...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Survey of Network Intrusion Detection Using K-Mean Algorithm

    Intrusion Detection System (IDS) due to novel attack method or upgraded. Because many current IDSs are constructing by point instruction of professional knowledge, changes to IDSs are costly and slow. Intrusion detection techniques can be categorizes into irregularity detection and mistreats detection. Anomaly detection systems, for example, IDES Intrusion Detection...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Enhanced Inter-Cloud System Architecture

    Cloud computing gains tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary provided with all the infrastructure facilities that a cloud user needs. But as the no of organizations adopting cloud system increases, the services providers need to ensure availability of various services, infrastructure...

    Provided By Kurukshetra University

  • White Papers // Mar 2013

    Spoof Attack Detection in Fingerprint Authentication Using Hybrid Fusion

    In the modern era, with the growing need of biometric technologies, spoof attacks are becoming a serious concern. A number of solutions have been proposed to detect the use of fake fingerprints. This paper takes advantage of skin elements in fingerprints, namely: minutiae points and ridge bifurcations to investigate spoof...

    Provided By Kurukshetra University

  • White Papers // Feb 2013

    Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review

    MANET (Mobile Ad-hoc NETwork) refers to a multi-hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANET'S are actually self organizing and adaptive networks that can be formed and deformed...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    Wireless Sensor Networks: Architecture, Protocols

    Wireless Sensor Networks (WSN) is an interconnection of a large number of nodes deployed for monitoring the system by means of measurement of its parameters. Recent research in wireless sensor networks has led to various new protocols which are particularly designed for sensor networks. To design these networks, the factors...

    Provided By Kurukshetra University

  • White Papers // Jan 2013

    A Comprehensive Study of Latest Security Models for MANETs: Covering Intrusion Detection and Denial of Service Attacks

    Mobile Ad-hoc NETworks (MANETs) are self organizing devices with no infrastructure control. Concept of security is major concern because of changing topology and no centralized control. Since MANET's are prone to many kind of vulnerabilities it is not necessary that any one kind of attack may be active at a...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    Analysis of Security Criteria for Partner Network

    The authors are allowing people outside their organization access to proprietary data and applications - over the internet. The objectives of this research are to form a secured infrastructure between partner network and internet. In today's competitive business landscape, organizations are compelled to share data, files, and applications with external...

    Provided By Kurukshetra University

  • White Papers // Dec 2012

    The Study of Multimedia Data Model Technology Based on Cloud Computing

    Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. Cloud computing is an emerging computing paradigm in which resources...

    Provided By Kurukshetra University

  • White Papers // Nov 2012

    A Novel Parallel Domain Focused Crawler for Reduction in Load on the Network

    World Wide Web is a collection of hyperlinked documents available in HTML format. Due to the growing and dynamic nature of the web, it has become a challenge to traverse all the URLs available in the web documents. The list of URL is very huge and so it is difficult...

    Provided By Kurukshetra University

  • White Papers // Oct 2012

    Effect of Malicious Nodes on AODV in Mobile Ad Hoc Networks

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network. It operates without the use of existing infrastructure. As mobile ad hoc network applications are deployed, Routing is one of the central requirements. Due to non central control, security is the major issue in...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Cloud Computing Security and Privacy Concerns

    In last few years, cloud computing concept has groomed a lot which result that it has become the fastest growing business for the IT industry. Because it has became a promising business concept with win-win situation for the clients to shift. Now, recession-hit companies have acknowledged that simply by shifting...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    GLAAR: Geographic Location Aware Adaptive Routing in Mobile Ad Hoc Networks (MANETs)

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring, wireless, low range/power, mobile infrastructure less network where each participating node itself manages the communication over the network. Node Location information may reduce the overall communication overhead for packet forwarding in Mobile Ad-Hoc NETworks (MANETs). This paper proposes a novel Geographic Location...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Analysis of Resilient Back-Propagation for Improving Software Process Control

    In this paper, the authors present the application of the neural network for the identification of Reusable Software modules in Oriented Software System. Metrics are used for the structural analysis of the different procedures. The values of Metrics will become the input dataset for the neural network systems. Training Algorithm...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    How Cloud Computing Will Affect College Libraries

    Past few years concept of cloud computing libraries become very popular. Even countries which are affected by recession started recognizing that by computer clouding fast access to data will enhance there productivity. Data and information about libraries can be placed in the cloud. In this paper, the authors will study...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Distributed Power Control With Energy Efficient Forwarding Routing Protocol for Wireless Sensor Network

    In wireless sensor network, to prolong the lifetime of the Sensor network, low power consumption is needed which can be obtained by facilitating low duty cycle and local signal processing. Thus a power control mechanism has to be designed and used to minimize the energy consumption. In addition to this,...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Prioritized Region Scheduling Based QoS Routing Over WMSN

    In this paper, the authors have proposed Prioritized Region Scheduling based Optimal Image Routing (PRSOIR) which optimally transmit image over wireless sensor network. Multiple paths are built and are scored using path conditions based on availability of resources along the paths. The proposed scheme is compared with non-optimal scheme that...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    Implementation of Back Propagation Algorithm Using MATLAB

    Artificial Neural Network (ANN) are highly interconnected and highly parallel systems. Back Propagation is a common method of training artificial neural networks so as to minimize objective function. This paper describes the implementation of back propagation algorithm. The error generated at the output is fed back to the input and...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    A Comparative Study of Traffic Padding Schemes to Prevent Traffic Analysis in Sensor Networks

    Wireless networks are envisioned to consist of large number of inexpensive and small nodes with sensing, data processing, and communication capabilities which are densely deployed in a region of interest and collaborate to accomplish a common task. One main challenge in design of these networks is their vulnerability to security...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Proposed Protocol for Hash-Secured Routing in Ad Hoc Networks

    A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been...

    Provided By Kurukshetra University

  • White Papers // Jul 2010

    Ranking Web-Services Based on QoS for Best-Fit Search

    While creating web applications using web service technology, there is a need for selecting a web service which best suits the need of application. As the number of web services available over the web has increased, the service consumers are always offered large number of services performing similar functionality. There...

    Provided By Kurukshetra University

  • White Papers // Sep 2009

    Software Design Simulation for Quick and Qualitative Application Development

    Software design simulation is a quick solution to qualitative application development. As one knows, the prime objective of every software development organization is to reach the stage of quick and qualitative software development. The paper presents a new approach to achieve this stage. This approach stores the design document in...

    Provided By Kurukshetra University

  • White Papers // Oct 2009

    Quality of Service Routing in Mobile Ad Hoc Networks Using Location and Energy Parameters

    Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or energy depletion of the mobile nodes. Also, to fulfill certain quality parameters, presence of multiple node-disjoint paths becomes essential. Such paths...

    Provided By Kurukshetra University

  • White Papers // Jan 2010

    Unicast and Multicast Routing Protocols for MANETs: A Comparative Survey

    A Mobile Ad-hoc Network (MANET) is a selfconfiguring network composed of mobile nodes without any fixed infrastructure. In a MANETs, there are no difference between a host node and a router so that all nodes can be source as well as forwarders of traffic. Moreover, all MANET components can be...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Energy Efficient Routing in mobile Ad Hoc network with Capacity Maximization

    A mobile ad hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Mobile ad-hoc networks are the autonomous systems of mobile nodes forming network in the absence of...

    Provided By Kurukshetra University

  • White Papers // Aug 2010

    A Survey of Routing Protocols in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETwork (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized control or established infrastructure. The wireless links in this network are highly error prone and can go down frequently due to mobility of nodes, interference and less infrastructure. Therefore, routing in...

    Provided By Kurukshetra University

  • White Papers // Jul 2010

    A Comparative Study for Secure Routing in MANET

    In the current era of wireless network, popularity of MANET is increasing at a very fast pace. Reason for this increased attention is the wide range of multimedia applications running in an infrastructure less environment. Because of the infrastructure less environment, limited power and dynamic topology it becomes very difficult...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Power Optimization in Mobile Ad Hoc Network

    A mobile ad hoc network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. Mobile ad-hoc networks are the autonomous systems of mobile nodes forming network in the absence of...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Enhancing the Performance of a Nodes in Ad-Hoc Networks Using Mobile Relay

    Nodes in Ad-hoc Networks are battery powered and hence have limited life time. Due to excessive utilization a node may die which can result in energy depletion problem and thereby affect overall network performance. Local rate of energy consumption on a node can be monitored. The authors can estimate the...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Wearable Computingand Related Issues

    A wearable computer is a small portable computer that is designed to be worn on the body during its use. Wearable computers are usually either integrated into the user's clothing or can be attached to the body through some other means, like a wristwatch and hands-free cell phone. A wearable...

    Provided By Kurukshetra University

  • White Papers // Jun 2011

    Artificial Intelligence - Man or Machine

    Artificial intelligence conceived either as an attempt to provide models of human cognition or as the development of programs able to perform intelligent tasks, is primarily interested in the uses of language. This paper is not related to any specific research but it covers the problem solving and various AI...

    Provided By Kurukshetra University

  • White Papers // Nov 2010

    IEEE WLANs Standards for Mobile Ad-Hoc Networks (MANETs): Performance Analysis

    Mobile Ad hoc NETworks(MANETs) catch the great attention of researchers because of its unique characteristics like independent of infrastructure, dynamic topology behavior, limited energy source, multihop routing, mobility of nodes etc. All these characteristics chase lots of challenges about security, reliability and performance issues. In this paper the authors present...

    Provided By Kurukshetra University

  • White Papers // Jan 2011

    Analyzing WLANs Standards for Wireless Sensor Network

    Wireless sensor network is a special kind of wireless network, design to communicate with distributes wireless nodes (Which supplies the information). Data collection from leaf sensor node to the central node for manipulation and prepare into information in useful format to the next observer node. Wireless sensor network may adopt...

    Provided By Kurukshetra University

  • White Papers // Aug 2013

    VADA - Veracity Aware Defence Algorithm for Cloud Computing Environment

    Security is one of the most exigent ongoing research areas in cloud computing as data owner stores the susceptible data to remote servers and users also access required data from remote cloud servers which is not controlled and managed by data owners. This paper proposed a new algorithm VADA (Veracity...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Security in Virtual Machine is Better Than Real Machine

    This position paper argues that the operating system and applications currently running on a real machine should relocate into a virtual machine. This structure enables services to be added below the operating system and to do so without trusting or modifying the operating system or applications. To demonstrate the usefulness...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Wireless Sensor for Effective Network Security Mechanism

    As wireless sensor networks continue to grow, so does the need for effective security mechanisms. Because sensor networks may interact with sensitive data and/or operate in hostile unattended environments, it is imperative that these security concerns be addressed from the beginning of the system design. The deployment of security solutions...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Adaptive Analysis of Throughput in Mobile Ad-Hoc Network (IEEE-802.11)

    The widespread use of mobile and handheld devices is likely to popularize ad hoc networks, which do not re-quire any wired infrastructure for intercommunication. In this paper, the authors present a Simulation base comparison of mobile ad hoc network with and without mobility. 100x100 meters areas, different data rate (2...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    BER Improvement Using MIMO : 2 x 2

    Wireless channel usually suffers from fading and interference from other users. Adaptive modulation may combat deep fading and ISI may be reduced by the use of OFDM. But with the use of spatial diversity better link performance can be obtained. In mobile wireless applications, where it is difficult to deploy...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Analysis of Energy Efficient Routing Protocols in Wireless Sensor Networks

    Wireless sensor networking is an emerging technology that has a wide range of potential applications including environment monitoring, smart spaces, medical systems and robotic exploration. Such a network normally consists of a large number of distributed nodes that organize themselves into a multi-hop wireless network. Conventional routing protocols may not...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Transmit Diversity Technique for Wireless Communication over Raleigh/Flat Channels using M-ary Modulation Schemes

    This paper presents a simple two-branch transmit diversity scheme using two transmit antennas and one receive antenna. It is also shown that the scheme may easily be generalized to two transmit antennas and M receive antennas to provide a diversity order of 2M. This scheme does not require any bandwidth...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    QoS Provisioning in VANETs Using Mobile Agent

    Due to the bandwidth limitation and vibrant topology of VANETS, supporting Quality of Service (QoS) in VANETs is a challenging task. Mobile agents are used to reduce the communication cost, especially over low bandwidth links, by moving the processing function to the data rather than bringing the data to a...

    Provided By Kurukshetra University

  • White Papers // Jun 2010

    Controller Based IDS Architecture in Distributed Nodes

    In the past few years, the performances of wireless technology have increased tremendously. It gives rise to many new fields in the area of networking. One of field is Ad-Hoc networks. It is a network in which the members of network can directly communicate with each other with in the...

    Provided By Kurukshetra University

  • White Papers // Feb 2010

    Design Approach Towards Improving the Overall Quality of Driving Experience in VANET

    In this paper, the authors will design traffic simulator which broadcast messages from server to all vehicles within the zone of reference. This system will collect information such as alerts, traffic updates such as position, ID, direction & broadcast this information to all vehicles but intelligence will be up to...

    Provided By Kurukshetra University

  • White Papers // May 2011

    A Beam Scanning UWB Antenna System for Wireless Applications

    Patch antenna is one of the most rapidly popular topics in the antenna field in the past twenty years. In high-performance aircraft, spacecraft, satellite and missile applications, where size, weight, cost, performance, ease of installation, and aerodynamic profile are constraints, and low profile antennas may be required. Electronic Steerable UWB...

    Provided By Kurukshetra University

  • White Papers // Apr 2010

    The Vertical Handoff Algorithm Using Fuzzy Decisions in Cellular Phone Networks

    A new, dynamic, cost effective and efficient Handoff algorithm is the need of the future world of Wireless Communication. The simple Fuzzy decisions can be used to design an effective and efficient Handoff algorithm. Few selected parameters such as Power Level, Cost, and Bandwidth along with the Speed of the...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Fuzzy Based Congestion Control in Wireless Network

    The tremendous growth of wireless networks demands the need to meet different multimedia (such as voice, audio, video, data, etc) applications available over the network. This application demand and allocation could lead to congestion if the network has to maintain such high resources for the quality of service requirements of...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Wi-Fi(802.11) Security Issues and Its Solution

    802.11 wireless LANs continue to gain market momentum. Higher speeds, larger bandwidth and improved quality of service are helping businesses realize the potential business benefits that wireless networking delivers. Now, with this growing adoption of 802.11 wireless LANs, security has become a focal point regarding the decision to deploy a...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Investigation on Throughput of a Multi Hop Network With Identical Station for Random Failure

    In Multi-hop networks stations may pump more traffic into the networks that can be supported, resulting in high packet-loss rate, re-routing instability unfairness and random failures problems due to this effect system efficiency. In this paper formulae has been used for numerical simulation from, by using this formulae, the authors...

    Provided By Kurukshetra University

  • White Papers // Jul 2011

    Performance Evaluation and Simulation Based Modeling of Energy Aware Variable Range DSR (VRDSR) Protocol

    Energy management is an important issue in Mobile Ad hoc NETworks (MANETs). Normally MANETs use common transmission range for data transfer. Transmitting with high power improves network performance by reducing the number of forwarding nodes. However, it results in interference and decreases network lifetime. The authors have tried variable range...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Back Up Cluster Head Determination Inwireless Sensor Routing Using Supervisory Selection Time Approach

    In Wireless Sensor Network, dynamic cluster based routing protocol approach is mostly used. In this approach, most frequently cluster reelection algorithm is performed due to the energy depletion of cluster heads. This repeated cluster head reelection increases the number of advertisement messages which in turn depletes the energy of overall...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    A Comprehensive Survey on Intrusion Detection in MANET

    With the progression of computer networks extending boundaries, Mobile Ad hoc NETwork (MANET) has emerged as a new frontier of technology to provide anywhere, anytime communication. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The absolute security in the mobile ad hoc network is very hard...

    Provided By Kurukshetra University

  • White Papers // Dec 2010

    Analysis of Security Issues and Performance Enhancement in Cloud Computing

    The ability to scale a web application or website is tied directly to understanding where the resource constraints lie and what impact the addition of various resources has on the application. Unfortunately, architects more often than not assume that simply adding another server into the mix can fix any performance...

    Provided By Kurukshetra University

  • White Papers // Oct 2011

    Malicious Node Detection in MANET

    A mobile ad hoc network consists of mobile wireless nodes. MANET is a self organized and self configurable network where the mobile nodes move arbitrarily. The mobile nodes can receive and forward packets as a router. Routing is a critical issue in MANET. In this paper a new scheme has...

    Provided By Kurukshetra University

  • White Papers // Jun 2009

    Cyber Warfare ? A Global Threat

    Many countries, including India are facing terrorism from many internal as well external forces. Terrorism should not be related with metallic weapons only but also related with the digital threats. Cyber warfare makes use of new type of armaments with various destructive effects on the target. Cyber weapons are usually...

    Provided By Kurukshetra University

  • White Papers // Dec 2011

    Towards Evaluation of Effect of Dos Attacks on Jitter in Mobile Ad-Hoc Networks Carrying Packet Telephony

    Jitter plays a very important role in implementation of Packet Telephony. It is a measure of packet ordering and mutual delay(s). In mobile ad-hoc network routing is done in decentralised manner with each node playing an equally important role in it. Any node with malicious intention has lot of scope...

    Provided By Kurukshetra University

  • White Papers // Aug 2012

    Throughput and Vulnerability Analysis of an IEEE 802.11b Wireless LAN

    Recent years have shown an unprecedented growth in the use of wireless LANs. However, unlike the relative simplicity of wired Ethernet deployments, IEEE 802.11-based wireless LANs uses Radio-Frequency (RF) data which is vulnerable to various attacks. This paper analyzes the IEEE 802.11b wireless LANs to determine variations in throughput so...

    Provided By Kurukshetra University

  • White Papers // Jul 2012

    GLAAR: Geographic Location Aware Adaptive Routing in Mobile Ad Hoc Networks (MANETs)

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring, wireless, low range/power, mobile infrastructure less network where each participating node itself manages the communication over the network. Node Location information may reduce the overall communication overhead for packet forwarding in Mobile Ad-Hoc NETworks (MANETs). This paper proposes a novel Geographic Location...

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Ant Colony Optimization: An Overview

    Ant colony optimization is a met heuristic approach belonging to the model based search algorithm. It is a paradigm for designing met heuristic algorithm for combinatorial problem. In this paper, the authors discuss the Ant colony system. Ant colony system is one of the best algorithms of Ant colony optimization....

    Provided By Kurukshetra University

  • White Papers // Jun 2012

    Search Engine Marketing: Key Factors in Design and Implementations

    In this paper, the authors are primarily focused on approaches & techniques to online promotion of electronic business models using special tools, including search engine optimization, online advertisements & new methods of generating visitors to a website. Last decade observed the emergence of search engine marketing as one of the...

    Provided By Kurukshetra University