Manipal University

Displaying 1-12 of 12 results

  • White Papers // Sep 2012

    Comparison of Certificate Policies for Merging Public Key Infrastructures During Merger and Acquisition of Companies

    The Public Key Infrastructure (PKI) provides facilities for data encryption, digital signature and time stamping. It is a system where different authorities verify and authenticate the validity of each participant with the use of digital certificates. A Certificate Policy (CP) is a named set of rules and it indicates the...

    Provided By Manipal University

  • White Papers // Aug 2012

    Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices

    n ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to...

    Provided By Manipal University

  • White Papers // Jul 2012

    Characteristic Analysis of VoIP Traffic for Wireless Networks in Comparison With CBR Using QualNet Network Simulator

    Voice over Internet Protocol (VoIP) is one of the most important technologies in the world of communication. Around 20 years of research on VoIP, some Quality of Service (QoS) problems of VoIP are still remaining. During the past decade and with growing of wireless technologies, the authors have seen that...

    Provided By Manipal University

  • White Papers // Jan 2012

    SMART: A Secure Multipath Anonymous Routing Technique

    Multipath routing for mobile Ad hoc networks is a technique of concurrent management and utilization of multiple paths for transmitting distributed data evenly across the nodes instead of routing all the traffic along a single path, potentially resulting in longer life-time along with the benefits of better transmission performance, fault...

    Provided By Manipal University

  • White Papers // Dec 2011

    Hybrid Routing Protocols for Ad Hoc Wireless Networks

    An ad hoc wireless network has a dynamic nature that leads to constant changes in its network topology. As a consequence, the routing problem becomes more complex and challengeable, and it probably is the most addressed and studied problem in ad hoc networks. Based on the routing information update mechanism...

    Provided By Manipal University

  • White Papers // Nov 2011

    Cloud Based Application Development for Accessing Restaurant Information on Mobile Device Using LBS

    Over the past couple of years, the extent of the services provided on the mobile devices has increased rapidly. A special class of service among them is the Location Based Service (LBS) which depends on the geographical position of the user to provide services to the end users. However, a...

    Provided By Manipal University

  • White Papers // Mar 2011

    Intelligent Refrigerator With Monitoring Capability Through Internet

    In conventional or standard refrigerator there is no system of automatically monitoring the materials or food items and also it will not replace immediately. An intelligent refrigerator is one which possesses self monitoring capability of food item or material with minimal or no human intervention. Such a product should have...

    Provided By Manipal University

  • White Papers // Jun 2009

    Improved C-Fuzzy Decision Tree for Intrusion Detection

    As the number of networked computers grows, intrusion detection is an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents the work to test and improve the performance of a new...

    Provided By Manipal University

  • White Papers // Jun 2009

    Simulations of Routing Protocols of Wireless Sensor Networks

    Wireless Sensor Network is widely used in electronics. Wireless sensor networks are now used in many applications including military, environmental, healthcare applications, home automation and traffic control. The authors will study one area of wireless sensor networks, which is the routing protocol. Routing protocols are needed to send data between...

    Provided By Manipal University

  • White Papers // Jun 2009

    Comparison of Different Types of Sources of Traffic Using SFQ Scheduling Discipline

    After running several simulations it is easy to think that the best option in traffic management is having CBR source because the number of lost packets and the variations of received packets have minimum fluctuations. But the truth is that it is almost impossible to maintain this kind of level...

    Provided By Manipal University

  • White Papers // May 2009

    Cluster Based Group Key Management in Mobile Ad Hoc Networks

    A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. It proposes a decentralized cluster based group key management scheme that uses a symmetric group key for communication within...

    Provided By Manipal University

  • White Papers // Dec 2008

    Intrusion Detection System Using Modified C-Fuzzy Decision Tree Classifier

    As the number of networked computers grows, intrusion detection becomes an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents the work to test and improve the performance of an intrusion...

    Provided By Manipal University

  • White Papers // Jul 2012

    Characteristic Analysis of VoIP Traffic for Wireless Networks in Comparison With CBR Using QualNet Network Simulator

    Voice over Internet Protocol (VoIP) is one of the most important technologies in the world of communication. Around 20 years of research on VoIP, some Quality of Service (QoS) problems of VoIP are still remaining. During the past decade and with growing of wireless technologies, the authors have seen that...

    Provided By Manipal University

  • White Papers // May 2009

    Cluster Based Group Key Management in Mobile Ad Hoc Networks

    A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. It proposes a decentralized cluster based group key management scheme that uses a symmetric group key for communication within...

    Provided By Manipal University

  • White Papers // Dec 2008

    Intrusion Detection System Using Modified C-Fuzzy Decision Tree Classifier

    As the number of networked computers grows, intrusion detection becomes an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents the work to test and improve the performance of an intrusion...

    Provided By Manipal University

  • White Papers // Jun 2009

    Simulations of Routing Protocols of Wireless Sensor Networks

    Wireless Sensor Network is widely used in electronics. Wireless sensor networks are now used in many applications including military, environmental, healthcare applications, home automation and traffic control. The authors will study one area of wireless sensor networks, which is the routing protocol. Routing protocols are needed to send data between...

    Provided By Manipal University

  • White Papers // Jun 2009

    Comparison of Different Types of Sources of Traffic Using SFQ Scheduling Discipline

    After running several simulations it is easy to think that the best option in traffic management is having CBR source because the number of lost packets and the variations of received packets have minimum fluctuations. But the truth is that it is almost impossible to maintain this kind of level...

    Provided By Manipal University

  • White Papers // Jun 2009

    Improved C-Fuzzy Decision Tree for Intrusion Detection

    As the number of networked computers grows, intrusion detection is an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents the work to test and improve the performance of a new...

    Provided By Manipal University

  • White Papers // Dec 2011

    Hybrid Routing Protocols for Ad Hoc Wireless Networks

    An ad hoc wireless network has a dynamic nature that leads to constant changes in its network topology. As a consequence, the routing problem becomes more complex and challengeable, and it probably is the most addressed and studied problem in ad hoc networks. Based on the routing information update mechanism...

    Provided By Manipal University

  • White Papers // Jan 2012

    SMART: A Secure Multipath Anonymous Routing Technique

    Multipath routing for mobile Ad hoc networks is a technique of concurrent management and utilization of multiple paths for transmitting distributed data evenly across the nodes instead of routing all the traffic along a single path, potentially resulting in longer life-time along with the benefits of better transmission performance, fault...

    Provided By Manipal University

  • White Papers // Aug 2012

    Ownership Authentication Transfer Protocol for Ubiquitous Computing Devices

    n ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may result the private data of the user to...

    Provided By Manipal University

  • White Papers // Mar 2011

    Intelligent Refrigerator With Monitoring Capability Through Internet

    In conventional or standard refrigerator there is no system of automatically monitoring the materials or food items and also it will not replace immediately. An intelligent refrigerator is one which possesses self monitoring capability of food item or material with minimal or no human intervention. Such a product should have...

    Provided By Manipal University

  • White Papers // Sep 2012

    Comparison of Certificate Policies for Merging Public Key Infrastructures During Merger and Acquisition of Companies

    The Public Key Infrastructure (PKI) provides facilities for data encryption, digital signature and time stamping. It is a system where different authorities verify and authenticate the validity of each participant with the use of digital certificates. A Certificate Policy (CP) is a named set of rules and it indicates the...

    Provided By Manipal University

  • White Papers // Nov 2011

    Cloud Based Application Development for Accessing Restaurant Information on Mobile Device Using LBS

    Over the past couple of years, the extent of the services provided on the mobile devices has increased rapidly. A special class of service among them is the Location Based Service (LBS) which depends on the geographical position of the user to provide services to the end users. However, a...

    Provided By Manipal University