Lovely Professional University

Displaying 1-40 of 63 results

  • White Papers // Oct 2013

    Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security

    In this paper, the authors have proved the diminution in error approximation when identity authentication is done with Ideal Password Authentication Scheme (IPAS) for Network Security. Effectiveness of identity authentication parameters for various attacks and security requirements is verified in the paper. Result of analysis proves that IPAS would enhance...

    Provided By Lovely Professional University

  • White Papers // Aug 2013

    Data Structures and DBMS for CAD Systems-A Review

    The structures for the storage of data in CAD systems influence to a large extent the effectiveness of the system. This paper reviews the wide range of data structures and DataBase Management Systems (DBMS) available for structuring CAD data. The relationship between these basic data types, their composite structures and...

    Provided By Lovely Professional University

  • White Papers // Jul 2013

    Multi Round Selective Encryption using AES Over Storage Cloud

    Cloud computing is the re-incarnation of the client-server architecture. It is highly promising technology because of its unlimited resource provisioning and data storage services which help them in managing the data as per requirements. Due to the use of internet and vital remote servers to maintain the data and applications,...

    Provided By Lovely Professional University

  • White Papers // Jun 2013

    Neuro-Fuzzy based Software Risk Estimation Tool

    To develop the secure software is one of the major concerns in the software industry. To make the easier task of finding and fixing the security flaws, software developers should integrate the security at all stages of Software Development Life Cycle (SDLC).In this paper, based on Neuro-Fuzzy approach software Risk...

    Provided By Lovely Professional University

  • White Papers // Jun 2013

    Virtualization, The Great Thing and Issues in Cloud Computing

    Now within IT industry virtualization is used between today's interfaces to abstract different layers from each other when one layer is updated, the others one needs update too. When one layer is defined, the upper and lower layer cannot be used for anything else. One of the Top must's rapidly...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Enhancement of Biometric Template Security in Multibiometric Systems

    Security is a very important aspect in the biometric systems. Biometric characteristics are unique to an individual hence the compromise of the biometric template is permanent. Attackers mostly attack on template and database of biometric system so securing them is a very crucial issue these days. Moreover the multi-biometric systems...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Battery Power Saving Profile with Learning Engine in Android Phones

    Android is an open platform which is becoming very popular operating system. Its open source code is easily handled by the users to get and use new contents and applications on their handsets. Android is based on Linux kernel. Android device are being activated per day and power management of...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Analysis of QOS Parameters of AAMRP and IODMRP Using SBPGP Security Model

    MANET has gained popularity in various fields as in vehicles, data transmission and bulk data transmission to a large single set of nodes. To accomplish this task routing protocol employ an important role in MANET. Different types of routing protocols have been proposed for different task to be done. Most...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Implementation and Analysis of Various PAPR Reduction Techniques Using MATLAB

    Orthogonal Frequency Division Multiplexing is a new and emerging technology that provide users with high data rate. But every coin has two sides, pros and cons. So does OFDM. On the better side it provides users with high data rate but on the down side the authors have PAPR. The...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Enhanced AODV for Mobile Ad-hoc Networks

    A mobile ad-hoc network comprises of mobile nodes that can communicate with the nodes within their radio range and also with those which are outside range by using route discovery mechanisms. The nodes in an ad-hoc network can act as a host and also as a router that can route...

    Provided By Lovely Professional University

  • White Papers // Apr 2013

    Performance Comparison of MIMO Systems Over AWGN and Rician Channels Using OSTBC4 With Zero Forcing Receivers

    Multiple-Input Multiple-Output (MIMO) is used in wireless communications to achieve high data rates within the limited frequency spectrum. MIMO uses multiple transmitting and receiving antennas so as to utilize the advantages of spatial diversity. The performance analysis of MIMO system over AWGN and Rician fading channels using OSTBC4 as space...

    Provided By Lovely Professional University

  • White Papers // Apr 2013

    Comparative Analysis of Various Authentication Techniques in Cloud Computing

    Over the recent years, there is a great advancement in the field of Computer Science. Cloud Computing is the result of advancement in the existing technologies. It shares the characteristics with Autonomic Computing, Client-Server Model, Grid Computing, Mainframe Computer, Utility Computing, Peer-to-Peer and Cloud Gaming. Cloud Computing is beneficial not...

    Provided By Lovely Professional University

  • White Papers // Apr 2013

    An Approach of Creating a Private Cloud for Universities and Security Issues in Private Cloud

    Cloud computing is one of the new innovation topic in the field of IT and provides benefits to enterprises as well as organizations. In the traditional technology, the authors download application and software's from internet and install on their own computers but in the era of new technology i.e. cloud...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    WiMax Networks:Binary Tree Based Keying

    Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Undeniably, networks have become very important techniques of exchanging information (data) in fast ways. (WIMAX) Worldwide Interoperability for Microwave Access is one of the greatest technologies in the communication area. WIMAX has...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Security Attacks with an Effective Solution for DOS Attacks in VANET

    Vehicular Ad hoc Networks is a special kind of mobile ad hoc network to provide communication among nearby vehicles and between vehicles and nearby fixed equipments. VANETs are mainly used for improving efficiency and safety of (future) transportation. There are chances of a number of possible attacks in VANET due...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Fire Detection Mechanism Using Fuzzy Logic

    Research in Wireless Sensor Networks (WSNs) has experienced a significant growth in recent years. One topic of special interest is the use of WSNs in the detection of forest fire as it is a common disastrous phenomenon that constitutes a serious threat. Numerous detection mechanisms are available for forest fire...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Middleware and Toolkits in Grid Computing

    The increasing demand for more computing power and data storage capacity in many fields of business, research, engineering, medical and science has raised the emergence of Grid Computing. Grid computing facilitates the environment where computers are interconnected with each other in such a manner that for making the execution faster...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Evaluating Strengths and Weaknesses of Agile Scrum Framework Using Knowledge Management

    This paper exploits strengths and weaknesses of agile Scrum framework using knowledge management. An agile framework Scrum widely used as agile manufacturing process. Many organizations prefer Scrum to complete their work in time. It is hugely beneficial if Scrum get improvised or enhanced with new features so that projects get...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Survey Paper on Energy Efficient Routing Protocol in MANET

    In mobile ad hoc network hierarchical approach and distributed approach are more practical as compared to the flat architecture. Energy efficiency in mobile ad hoc network is very important. Similar the looping free path is also very important. There are the numbers of protocol for ad hoc network but one...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Using Third Party Auditor for Cloud Data Security: A Review

    Cloud data security is a major concern for the client while using the cloud services provided by the service provider. There can be some security issues and conflicts between the client and the service provider. To resolve those issues, a third party can be used as an auditor. In this...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    A Study on Adaptive Fault Tolerance in Real Time Cloud Computing

    The biggest buzz in the computer world is Cloud Computing. To different people cloud computing means different things. Cloud computing may be defined as management and provision of resources, software, application and information as services over the cloud or internet and demand. Cloud infrastructure provides great potentials in low cost...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Cloud Computing and Social Networks: A Comparison Study of Myspace and Facebook

    Social networks provide a virtual place where people can interact and share. With the increasing user base and the competition social networks needed a scalable, cost-effective backend architecture and efficient business model. All these objectives can be accomplished by adopting cloud computing architecture at the backend and the SaaS business...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    The Heterogeneous Routing Problem With Stochastic Demand and Client Priority Solving by Clustering Genetic Algorithm

    The Heterogeneous Fleet Vehicle Routing Problem (HVRP) is a variant of the classical Vehicle Routing Problem in which customers are served by a heterogeneous fleet of vehicles with various capacities, fixed and variable costs. Due to its complexity, there's no exact algorithm for this problem. A new scheme based on...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    A Dynamic Position Based Routing Protocol to Optimize Packet Delivery in Mobile Adhoc Network

    Mobile Ad hoc NETworks (MANET) carried out multi-hop communication in an environment with no fixed infrastructure, by means of mobile nodes and changing network topology. In the earlier period, hundreds of new routing protocols were designed for the various scenarios of MANET. Most existing ad hoc routing protocols are liable...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Headway Based Model for Effective Broadcast in Vehicular Ad-Hoc Networks

    Wireless communications are becoming the dominant form of transferring information and the most active research field. This paper presents one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc NETworks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles and each other, besides,...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Black Hole Attack in Kerberos Assisted Authentication Protocol

    Kaman is the extension of Kerberos protocol; with the use of Kaman nodes in the ad hoc network are authenticated by the secure server. This posed the remedial venture to large number of attacks like replay attack, fabrication, eavesdropping etc Kaman provides secure solution to the problem of secure channel...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Enhanced Coherency Technique for XML Keyword Search-A Review

    Keyword search techniques which use advantages of XML structure make it simpler for ordinary users to query XML databases, but latest approaches to processing these queries depend on heuristics that are ultimately ad hoc. These approaches often retrieve not correct answers, overlook appropriate answers, and cannot rank answers properly. To...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Comparative Analysis of Leach and Its Descendant Protocols in Wireless Sensor Network

    Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them to the sink via a single hop or multi-hop path. In wireless sensor networks, due to limited...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Classification of Hierarchical Routing Protocols in Wireless Sensor Network: A Survey

    The popularity of wireless sensor networks is increasing tremendously day by day due to the vast potential of sensor networks to provide many applications such as military applications, health monitoring, environmental monitoring, etc. For the different application areas there are different technical issues that the researchers are resolving. Wireless sensor...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review on Prominent Clustering Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is considered as most recent technology for data gathering. The sensor devices are made up of hundreds or thousands of sensor nodes deployed over a huge geographical area. Due to the limited power of the Wireless Sensor Networks (WSNs), the network lifetime becomes a critical issue...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Improving Accuracy in Decision Making for Detecting Intruders

    Normal host based Intrusion detection system provides the user some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employees of the enterprise access some files on which basis policy and permissions are applied. If these are incorrectly...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review: Comparative Analysis of Routing Protocols in Wireless Sensor Network

    Wireless sensor networks are recently rapidly growing research area in wireless communications and distributed network. Wireless sensor network consists of a large number of low-cost, low-power, and multifunctional sensor nodes with the capability to sense the various types of physical and environmental condition. The sensor nodes have a limited transmission...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Fault Tolerance Techniques and Comparative Implementation in Cloud Computing

    Cloud computing is the result of evolution of on demand service in computing paradigms of large scale distributed computing. It is the adoptable technology as it provides integration of software and resources which are dynamically scalable. These systems are more or less prone to failure. Fault tolerance assesses the ability...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Performance Analysis of MIMO Systems Over AWGN Channel with Antenna Selection Using Zero Forcing Receivers

    High data rates within the limited Radio Frequency (RF) spectrum is always desirable that leads to radios with capabilities beyond a Single-Input Single-Output (SISO) topology. Recently introduced wireless systems have adopted Multiple-Input Multiple-Output (MIMO) topologies that use two or more transmitters and two or more receivers to send data simultaneously...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Peak to Average Power Ratio Reduction of OFDM Signal by Combining Clipping with Walsh Hadamard Transform

    Wireless communications have been developed widely and rapidly in the modern world especially during the last decade. Orthogonal Frequency Division Multiplexing (OFDM) has grown to a popular communication technique for high speed communication. Besides of the advantages, one of main disadvantage of OFDM is high Peak to Average Power Ratio...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Performance Comparison of MIMO Systems over AWGN and Rician Channels with Zero Forcing Receivers

    Multiple-Input Multiple-Output (MIMO) systems have been emerged as a technical breakthrough for high-data-rate wireless transmission. The performance of MIMO system can be improved by using different antenna selection so as to provide spatial diversity. In this paper, the performance of MIMO system over AWGN (Additive White Gaussian Noise) and Rician...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Preventing Black Hole and IP Spoofing Attack Using Diffie-Helman Algorithm

    The wireless ad hoc network is the self configuring type of network. The wireless enable nodes can join or leave the network as they want. In this type of network many type of internal as well as external attacks are possible. When the source nodes want to transmit data to...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review on Cloud Computing Privacy Solutions

    Cloud computing allows data and services to be placed in a pool of resources. The clients are able to access the resources of the cloud through service providers. The flow of these resources takes place through a common channel i.e. internet. The common channel makes it vulnerable to attacks. These...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review on Vehicle to Vehicle Communication Protocols in VANETs

    Vehicular Ad hoc Networks is a form or type of mobile ad-hoc network to provide communication among nearby vehicles and nearby fixed equipments or roadside units for improving efficiency and safety of transportation. Even though it possesses characteristics of high node mobility and fast topology changes but still it can...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Study of Secure Routing Protocols

    Mobile ad hoc networks have no fixed infrastructure available for routing packets in an end to end network and instead rely on intermediary peers. There are various types of attacks which an effect the MANETs. Routing protocols, data, bandwidth and battery power are the common target of these attacks. This...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Security Attacks with an Effective Solution for DOS Attacks in VANET

    Vehicular Ad hoc Networks is a special kind of mobile ad hoc network to provide communication among nearby vehicles and between vehicles and nearby fixed equipments. VANETs are mainly used for improving efficiency and safety of (future) transportation. There are chances of a number of possible attacks in VANET due...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Fire Detection Mechanism Using Fuzzy Logic

    Research in Wireless Sensor Networks (WSNs) has experienced a significant growth in recent years. One topic of special interest is the use of WSNs in the detection of forest fire as it is a common disastrous phenomenon that constitutes a serious threat. Numerous detection mechanisms are available for forest fire...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Middleware and Toolkits in Grid Computing

    The increasing demand for more computing power and data storage capacity in many fields of business, research, engineering, medical and science has raised the emergence of Grid Computing. Grid computing facilitates the environment where computers are interconnected with each other in such a manner that for making the execution faster...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Evaluating Strengths and Weaknesses of Agile Scrum Framework Using Knowledge Management

    This paper exploits strengths and weaknesses of agile Scrum framework using knowledge management. An agile framework Scrum widely used as agile manufacturing process. Many organizations prefer Scrum to complete their work in time. It is hugely beneficial if Scrum get improvised or enhanced with new features so that projects get...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Fault Tolerance Techniques and Comparative Implementation in Cloud Computing

    Cloud computing is the result of evolution of on demand service in computing paradigms of large scale distributed computing. It is the adoptable technology as it provides integration of software and resources which are dynamically scalable. These systems are more or less prone to failure. Fault tolerance assesses the ability...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Performance Analysis of MIMO Systems Over AWGN Channel with Antenna Selection Using Zero Forcing Receivers

    High data rates within the limited Radio Frequency (RF) spectrum is always desirable that leads to radios with capabilities beyond a Single-Input Single-Output (SISO) topology. Recently introduced wireless systems have adopted Multiple-Input Multiple-Output (MIMO) topologies that use two or more transmitters and two or more receivers to send data simultaneously...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Peak to Average Power Ratio Reduction of OFDM Signal by Combining Clipping with Walsh Hadamard Transform

    Wireless communications have been developed widely and rapidly in the modern world especially during the last decade. Orthogonal Frequency Division Multiplexing (OFDM) has grown to a popular communication technique for high speed communication. Besides of the advantages, one of main disadvantage of OFDM is high Peak to Average Power Ratio...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Performance Comparison of MIMO Systems over AWGN and Rician Channels with Zero Forcing Receivers

    Multiple-Input Multiple-Output (MIMO) systems have been emerged as a technical breakthrough for high-data-rate wireless transmission. The performance of MIMO system can be improved by using different antenna selection so as to provide spatial diversity. In this paper, the performance of MIMO system over AWGN (Additive White Gaussian Noise) and Rician...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Survey Paper on Energy Efficient Routing Protocol in MANET

    In mobile ad hoc network hierarchical approach and distributed approach are more practical as compared to the flat architecture. Energy efficiency in mobile ad hoc network is very important. Similar the looping free path is also very important. There are the numbers of protocol for ad hoc network but one...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Using Third Party Auditor for Cloud Data Security: A Review

    Cloud data security is a major concern for the client while using the cloud services provided by the service provider. There can be some security issues and conflicts between the client and the service provider. To resolve those issues, a third party can be used as an auditor. In this...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    A Study on Adaptive Fault Tolerance in Real Time Cloud Computing

    The biggest buzz in the computer world is Cloud Computing. To different people cloud computing means different things. Cloud computing may be defined as management and provision of resources, software, application and information as services over the cloud or internet and demand. Cloud infrastructure provides great potentials in low cost...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Preventing Black Hole and IP Spoofing Attack Using Diffie-Helman Algorithm

    The wireless ad hoc network is the self configuring type of network. The wireless enable nodes can join or leave the network as they want. In this type of network many type of internal as well as external attacks are possible. When the source nodes want to transmit data to...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review on Cloud Computing Privacy Solutions

    Cloud computing allows data and services to be placed in a pool of resources. The clients are able to access the resources of the cloud through service providers. The flow of these resources takes place through a common channel i.e. internet. The common channel makes it vulnerable to attacks. These...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review on Vehicle to Vehicle Communication Protocols in VANETs

    Vehicular Ad hoc Networks is a form or type of mobile ad-hoc network to provide communication among nearby vehicles and nearby fixed equipments or roadside units for improving efficiency and safety of transportation. Even though it possesses characteristics of high node mobility and fast topology changes but still it can...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Cloud Computing and Social Networks: A Comparison Study of Myspace and Facebook

    Social networks provide a virtual place where people can interact and share. With the increasing user base and the competition social networks needed a scalable, cost-effective backend architecture and efficient business model. All these objectives can be accomplished by adopting cloud computing architecture at the backend and the SaaS business...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    The Heterogeneous Routing Problem With Stochastic Demand and Client Priority Solving by Clustering Genetic Algorithm

    The Heterogeneous Fleet Vehicle Routing Problem (HVRP) is a variant of the classical Vehicle Routing Problem in which customers are served by a heterogeneous fleet of vehicles with various capacities, fixed and variable costs. Due to its complexity, there's no exact algorithm for this problem. A new scheme based on...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    A Dynamic Position Based Routing Protocol to Optimize Packet Delivery in Mobile Adhoc Network

    Mobile Ad hoc NETworks (MANET) carried out multi-hop communication in an environment with no fixed infrastructure, by means of mobile nodes and changing network topology. In the earlier period, hundreds of new routing protocols were designed for the various scenarios of MANET. Most existing ad hoc routing protocols are liable...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Effective Cost Mechanism for Cloudlet Retransmission and Prioritized VM Scheduling Mechanism Over Broker Virtual Machine Communication Framework

    In current scenario cloud computing is most widely increasing platform for task execution. Lot of research is going on to cut down the cost and execution time. In this paper, the authors propose an efficient algorithm to have an effective and fast execution of task assigned by the user. They...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Efficient Resource Allocation in Resource Provisioning Policies Over Resource Cloud Communication Paradigm

    Optimal resource utilization for executing tasks within the cloud is one of the biggest challenges. In executing the task over a cloud, the resource provisioner is responsible for providing the resources to create virtual machines. To utilize the resources optimally, the resource provisioner has to take care of the process...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    WiMax Networks:Binary Tree Based Keying

    Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Undeniably, networks have become very important techniques of exchanging information (data) in fast ways. (WIMAX) Worldwide Interoperability for Microwave Access is one of the greatest technologies in the communication area. WIMAX has...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review: Comparative Analysis of Routing Protocols in Wireless Sensor Network

    Wireless sensor networks are recently rapidly growing research area in wireless communications and distributed network. Wireless sensor network consists of a large number of low-cost, low-power, and multifunctional sensor nodes with the capability to sense the various types of physical and environmental condition. The sensor nodes have a limited transmission...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Improving Accuracy in Decision Making for Detecting Intruders

    Normal host based Intrusion detection system provides the user some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employees of the enterprise access some files on which basis policy and permissions are applied. If these are incorrectly...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Review on Prominent Clustering Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) is considered as most recent technology for data gathering. The sensor devices are made up of hundreds or thousands of sensor nodes deployed over a huge geographical area. Due to the limited power of the Wireless Sensor Networks (WSNs), the network lifetime becomes a critical issue...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Comparative Analysis of Leach and Its Descendant Protocols in Wireless Sensor Network

    Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them to the sink via a single hop or multi-hop path. In wireless sensor networks, due to limited...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    Classification of Hierarchical Routing Protocols in Wireless Sensor Network: A Survey

    The popularity of wireless sensor networks is increasing tremendously day by day due to the vast potential of sensor networks to provide many applications such as military applications, health monitoring, environmental monitoring, etc. For the different application areas there are different technical issues that the researchers are resolving. Wireless sensor...

    Provided By Lovely Professional University

  • White Papers // Apr 2013

    Performance Comparison of MIMO Systems Over AWGN and Rician Channels Using OSTBC4 With Zero Forcing Receivers

    Multiple-Input Multiple-Output (MIMO) is used in wireless communications to achieve high data rates within the limited frequency spectrum. MIMO uses multiple transmitting and receiving antennas so as to utilize the advantages of spatial diversity. The performance analysis of MIMO system over AWGN and Rician fading channels using OSTBC4 as space...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Enhancement of Biometric Template Security in Multibiometric Systems

    Security is a very important aspect in the biometric systems. Biometric characteristics are unique to an individual hence the compromise of the biometric template is permanent. Attackers mostly attack on template and database of biometric system so securing them is a very crucial issue these days. Moreover the multi-biometric systems...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Battery Power Saving Profile with Learning Engine in Android Phones

    Android is an open platform which is becoming very popular operating system. Its open source code is easily handled by the users to get and use new contents and applications on their handsets. Android is based on Linux kernel. Android device are being activated per day and power management of...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Analysis of QOS Parameters of AAMRP and IODMRP Using SBPGP Security Model

    MANET has gained popularity in various fields as in vehicles, data transmission and bulk data transmission to a large single set of nodes. To accomplish this task routing protocol employ an important role in MANET. Different types of routing protocols have been proposed for different task to be done. Most...

    Provided By Lovely Professional University

  • White Papers // May 2013

    Implementation and Analysis of Various PAPR Reduction Techniques Using MATLAB

    Orthogonal Frequency Division Multiplexing is a new and emerging technology that provide users with high data rate. But every coin has two sides, pros and cons. So does OFDM. On the better side it provides users with high data rate but on the down side the authors have PAPR. The...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Performance Analysis of AODV Using HTTP Traffic Under Black Hole Attack in MANET

    Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the aid of any established infrastructure or centralized administration. The mobility of nodes in MANETs changes frequently which results in changing network topology, due to changing network topology routing in MANETs a challenging...

    Provided By Lovely Professional University

  • White Papers // Sep 2012

    Validating the Applicability of Agile Requirement Generation Model

    The authors all know that agile methodology for software development is an alternative to waterfall methodology for software development. In today's scenario, agile methods have caught the attention of software engineers worldwide. The reasons of this popularity are its iterative nature, quick delivery of software, face to face communication, less...

    Provided By Lovely Professional University

  • White Papers // Nov 2012

    A New Survivability Strategy with Congestion Control in WDM Optical Networks

    Due to huge usage of internet and growing business, bandwidth required prove to be difficult resource to fulfill with normal structure of networks. Moreover to provide a good level of quality service is also a big concern. One big solution comes in form of Wavelength Division Multiplexing (WDM). Wavelength Division...

    Provided By Lovely Professional University

  • White Papers // Dec 2012

    Methodology for Improving Performance of Video Conferencing with Additional Security

    Video conference is becoming so popular in today world. People have to go for Distance places for attending meetings but this problem is solved by the videoconferencing. One person can communicate with other person using their webcam while remain in the one location. He needs not to go distant place...

    Provided By Lovely Professional University

  • White Papers // Oct 2012

    Use of Data Mining Techniques for the Evaluation of Student Performance:A Case Study

    Data and Information or Knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. Due to the importance of extracting knowledge/information from the large data repositories, data mining has...

    Provided By Lovely Professional University

  • White Papers // Feb 2013

    A Study of Secure Routing Protocols

    Mobile ad hoc networks have no fixed infrastructure available for routing packets in an end to end network and instead rely on intermediary peers. There are various types of attacks which an effect the MANETs. Routing protocols, data, bandwidth and battery power are the common target of these attacks. This...

    Provided By Lovely Professional University

  • White Papers // Aug 2012

    Comparative Study of RKC and GCM Mode of Operation

    In the race of designing an efficient 'Authenticated Encryption (AE) mode of operation' several efforts have been done over past few years. In practical, when the authors have to send any data, they also need integrity and authentication along with the encrypted message. These requirements in real world prioritize Authenticated...

    Provided By Lovely Professional University

  • White Papers // Jun 2012

    Intelligent Methods for Resource Allocation in Grid Computing

    In the era of grid computing, resource allocation plays a vital role for assigning the available resources. This paper describes how to reduce the search time for the best available resources and assure instant provisioning of the lately added resources to the grid thereby using clustering and artificial neural networks....

    Provided By Lovely Professional University

  • White Papers // May 2012

    Securing Network Using Network Access Control, User and Resource Management, and Location-Based Security

    The first and primary law of network access control is to limit the access of network resources among the various types of users. NAC basically decides whom to let go onto the network. It decides the validity of user based on their identity and role. But its work does not...

    Provided By Lovely Professional University

  • White Papers // Mar 2013

    Headway Based Model for Effective Broadcast in Vehicular Ad-Hoc Networks

    Wireless communications are becoming the dominant form of transferring information and the most active research field. This paper presents one of the most applicable forms of Ad-Hoc networks; the Vehicular Ad-Hoc NETworks (VANETs). VANET is the technology of building a robust Ad-Hoc network between mobile vehicles and each other, besides,...

    Provided By Lovely Professional University