MANONMANIAM SUNDARANAR UNIVERSITY

Displaying 1-21 of 21 results

  • White Papers // Dec 2013

    A Scope for MANET Routing and Security Threats

    The Mobile Ad-hoc NETworks (MANET) are wireless networks which utilize mobile nodes for communicating among them and in the external transmission range. The vulnerable nature of the network causes various security threats which upset its growth. In this paper, initially the existing security attacks in MANET are analyzed. The attacks...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Oct 2013

    Classification Algorithms in Intrusion Detection System: A Survey

    Intrusion Detection system is a software which helps the user to protect the authors' system from other system when other person tries to access their system through network. It secures their system resources without giving access to other system. Nowadays internet has becoming more popular and wide. Many of them...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Jul 2013

    Next Generation Data Warehouse Design with Big Data for Big Analytics and Better Insights

    Traditionally organizations invested more in decision support systems. With the evolution of business intelligence tools many organizations were able to get analytical reports based on OLAP systems. Now with the frequently changing trends in customer behavior and customer markets there is a huge necessity for enterprises to get analytical reports...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Nov 2012

    Search in Unstructured Peer-to-Peer Networks Based on Dynamic Topology Adaptation

    Peer-To-Peer networks (P2P) have gained great attention and popularity. One key challenge aspect in Unstructured P2P resource sharing environments is efficient searching algorithm. Flooding and Random Walk (RW) are two typical search algorithms. Flooding searches aggressively and covers most nodes but it generates large amount of query messages. RW searches...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Sep 2012

    Kernelized Extreme Learning Machine with Levenberg-Marquardt Learning Approach towards Intrusion Detection

    Network and system security is of vital importance in the present data communication environment. Hackers and intruders can create many successful attempts to cause the crash of the networks and web services by unauthorized intrusion. New threats and associated solutions to prevent these threats are emerging together with the secured...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Sep 2012

    Design and Implementation of SOC in NIOS-II Soft Core Processor for Secured Wireless Communication

    In the modern world, the information that could benefit the individual/a group also can be used against such individual or group. Encryption is the technique of converting a plaintext (original data packet) into cipher text (encrypted message) which can be decoded back into the original message. There are several types...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Sep 2012

    Novel Pre-Processing Technique for Web Log Mining by Removing Global Noise, Cookies and Web Robots

    Today internet has made the life of human dependent on it. Almost everything and anything can be searched on net. Web pages usually contain huge amount of information that may not interest the user, as it may not be the part of the main content of the web page. Web...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Jun 2012

    A Novel Leader Based Reputation Approach for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is more vulnerable to routing attacks due to its open nature of medium, decentralized administration, lack of security, dynamic network topology, multi-hop routing, energy limited operation, lack of scalability etc. There are high probabilities for misbehaving node to launch any kind of attack in...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Aug 2011

    Temporal Databases and Frequent Pattern Mining Techniques

    Data mining is the process of exploring and analyzing data from different perspective, using automatic or semiautomatic techniques to extract knowledge or useful information and discover correlations or meaningful patterns and rules from large databases. One of the most vital characteristic missed by the traditional data mining systems is their...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2011

    Disconnected Transaction Management Scheme for Agent Based Mobile Networks

    In this paper, the authors define a disconnected transaction management scheme for agent based mobile networks. This scheme proposes an environment in which mobile users can have simultaneous access to data by using the cache stored in the Fixed Agent. Data Access Manager module at the Fixed Agent controls the...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2011

    Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding

    A scheme that integrates digital signature and data hiding to provide hi-tech authentication for palette images is proposed in this paper. The scheme extracts digital signature from the original palette image and embeds it back into the same palette image, avoiding additional signature file. Digital signature generation is employed using...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2011

    Raise the Temporal Database From a Snapshot Database

    A major aspect of the communication between time and information is the multiple relationships that exist between the two concepts. Temporal Association Rule Mining is a challenging research area for which many stimulating problems remain open. The incorporation of temporal semantics to existing Data mining techniques provides additional meaning to...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Dec 2010

    An Efficient Vehicular Communication Outside the City Environments

    Communication network plays an important role in providing safe vehicular movement. The main achievement of VANET is providing comfort and safety for passengers. In addition to that, various transactions like information on accident, road condition, petrol bank details, menu in the restaurant, and discount sales can be provided to the...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Nov 2010

    CBVANET: A Cluster Based Vehicular Adhoc Network Model for Simple Highway Communication

    VANET is a special class of Mobile Ad hoc Network. VANET is mainly used to model communication in a Vehicular environment where the vehicles are considered as VANET nodes with wireless links. In this paper an attempt has been made to create a new cluster model for efficient communication among...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Oct 2010

    An Efficient Routing Scheme for Reliable Path Establishment Among Mobile Devices in Heterogeneous Networks

    In heterogeneous networks, devices available with varying connectivity help to provide many new opportunities for efficiently utilizing new resources. In mobile ad hoc networks with varying layered architecture, not much interest is given yet in establishing path among devices with increasing or decreasing in number of mobile devices in the...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Oct 2010

    Reliable Point to Multipoint Hierarchical Routing in Scatternet Sensor Network

    In the recent development of communication, Bluetooth Scatternet wireless is a technology developed for wideband local accesses. Bluetooth technology is very popular because of its low cost and easy deployment which is based on IEEE 802.11 standards. On the other hand Wireless Sensor Network (WSN) consists of large number of...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Aug 2010

    Fire Detection Using Support Vector Machine in Wireless Sensor Network and Rescue Using Pervasive Devices

    In the recent days, environment is polluted day by day due to various factors. One of the causes is smokes during the massive fires. Using Wireless Sensor Networks (WSN) fire can be detected earlier and also initiate the rescue operation before it becomes fire. In this paper, the authors will...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Jul 2010

    HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based on Location

    A pervasive network consists of heterogeneous devices with different computing, storage, mobility and connectivity properties working together to solve real-world problems. The emergence of wireless sensor networks has enabled new classes of applications in pervasive world that benefit a large number of fields. Routing in wireless sensor networks is a...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // May 2010

    Implementation of a Cloud Data Server (CDS) for Providing Secure Service in e-Business

    Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. In spite of several ongoing researches Conventional Web Servers...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2010

    Exploring Round Trip Time fairness for Adaptive Layered Transmission Control Protocol

    High performance data transfer services is needed in long distance high-speed networks. In this paper Adaptive Layered Transmission Control Protocol (ALTCP) is proposed, which is used for making more scalability in high speed networks. ALTCP is a simple adaptive layering technique for making the Additive Increase Multiplicative Decrease (AIMD) algorithms...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Dec 2008

    Integrated Intrusion Detection System Using Soft Computing

    Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Intrusion Detection are currently being used but they are relatively ineffective. Among the several soft computing paradigms, authors investigated genetic algorithms and neural networks to model fast and efficient Intrusion Detection Systems. With the feature selection...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Oct 2010

    An Efficient Routing Scheme for Reliable Path Establishment Among Mobile Devices in Heterogeneous Networks

    In heterogeneous networks, devices available with varying connectivity help to provide many new opportunities for efficiently utilizing new resources. In mobile ad hoc networks with varying layered architecture, not much interest is given yet in establishing path among devices with increasing or decreasing in number of mobile devices in the...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Nov 2010

    CBVANET: A Cluster Based Vehicular Adhoc Network Model for Simple Highway Communication

    VANET is a special class of Mobile Ad hoc Network. VANET is mainly used to model communication in a Vehicular environment where the vehicles are considered as VANET nodes with wireless links. In this paper an attempt has been made to create a new cluster model for efficient communication among...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Oct 2010

    Reliable Point to Multipoint Hierarchical Routing in Scatternet Sensor Network

    In the recent development of communication, Bluetooth Scatternet wireless is a technology developed for wideband local accesses. Bluetooth technology is very popular because of its low cost and easy deployment which is based on IEEE 802.11 standards. On the other hand Wireless Sensor Network (WSN) consists of large number of...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2010

    Exploring Round Trip Time fairness for Adaptive Layered Transmission Control Protocol

    High performance data transfer services is needed in long distance high-speed networks. In this paper Adaptive Layered Transmission Control Protocol (ALTCP) is proposed, which is used for making more scalability in high speed networks. ALTCP is a simple adaptive layering technique for making the Additive Increase Multiplicative Decrease (AIMD) algorithms...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Aug 2010

    Fire Detection Using Support Vector Machine in Wireless Sensor Network and Rescue Using Pervasive Devices

    In the recent days, environment is polluted day by day due to various factors. One of the causes is smokes during the massive fires. Using Wireless Sensor Networks (WSN) fire can be detected earlier and also initiate the rescue operation before it becomes fire. In this paper, the authors will...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2011

    Hi-Tech Authentication for Palette Images Using Digital Signature and Data Hiding

    A scheme that integrates digital signature and data hiding to provide hi-tech authentication for palette images is proposed in this paper. The scheme extracts digital signature from the original palette image and embeds it back into the same palette image, avoiding additional signature file. Digital signature generation is employed using...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Jul 2010

    HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based on Location

    A pervasive network consists of heterogeneous devices with different computing, storage, mobility and connectivity properties working together to solve real-world problems. The emergence of wireless sensor networks has enabled new classes of applications in pervasive world that benefit a large number of fields. Routing in wireless sensor networks is a...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2011

    Disconnected Transaction Management Scheme for Agent Based Mobile Networks

    In this paper, the authors define a disconnected transaction management scheme for agent based mobile networks. This scheme proposes an environment in which mobile users can have simultaneous access to data by using the cache stored in the Fixed Agent. Data Access Manager module at the Fixed Agent controls the...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Dec 2010

    An Efficient Vehicular Communication Outside the City Environments

    Communication network plays an important role in providing safe vehicular movement. The main achievement of VANET is providing comfort and safety for passengers. In addition to that, various transactions like information on accident, road condition, petrol bank details, menu in the restaurant, and discount sales can be provided to the...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Apr 2011

    Raise the Temporal Database From a Snapshot Database

    A major aspect of the communication between time and information is the multiple relationships that exist between the two concepts. Temporal Association Rule Mining is a challenging research area for which many stimulating problems remain open. The incorporation of temporal semantics to existing Data mining techniques provides additional meaning to...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Sep 2012

    Kernelized Extreme Learning Machine with Levenberg-Marquardt Learning Approach towards Intrusion Detection

    Network and system security is of vital importance in the present data communication environment. Hackers and intruders can create many successful attempts to cause the crash of the networks and web services by unauthorized intrusion. New threats and associated solutions to prevent these threats are emerging together with the secured...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Sep 2012

    Design and Implementation of SOC in NIOS-II Soft Core Processor for Secured Wireless Communication

    In the modern world, the information that could benefit the individual/a group also can be used against such individual or group. Encryption is the technique of converting a plaintext (original data packet) into cipher text (encrypted message) which can be decoded back into the original message. There are several types...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Sep 2012

    Novel Pre-Processing Technique for Web Log Mining by Removing Global Noise, Cookies and Web Robots

    Today internet has made the life of human dependent on it. Almost everything and anything can be searched on net. Web pages usually contain huge amount of information that may not interest the user, as it may not be the part of the main content of the web page. Web...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Jul 2013

    Next Generation Data Warehouse Design with Big Data for Big Analytics and Better Insights

    Traditionally organizations invested more in decision support systems. With the evolution of business intelligence tools many organizations were able to get analytical reports based on OLAP systems. Now with the frequently changing trends in customer behavior and customer markets there is a huge necessity for enterprises to get analytical reports...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Oct 2013

    Classification Algorithms in Intrusion Detection System: A Survey

    Intrusion Detection system is a software which helps the user to protect the authors' system from other system when other person tries to access their system through network. It secures their system resources without giving access to other system. Nowadays internet has becoming more popular and wide. Many of them...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Dec 2013

    A Scope for MANET Routing and Security Threats

    The Mobile Ad-hoc NETworks (MANET) are wireless networks which utilize mobile nodes for communicating among them and in the external transmission range. The vulnerable nature of the network causes various security threats which upset its growth. In this paper, initially the existing security attacks in MANET are analyzed. The attacks...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Dec 2008

    Integrated Intrusion Detection System Using Soft Computing

    Intrusion Detection systems are increasingly a key part of system defense. Various approaches to Intrusion Detection are currently being used but they are relatively ineffective. Among the several soft computing paradigms, authors investigated genetic algorithms and neural networks to model fast and efficient Intrusion Detection Systems. With the feature selection...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // May 2010

    Implementation of a Cloud Data Server (CDS) for Providing Secure Service in e-Business

    Cloud Data Servers is the novel approach for providing secure service to e-business .Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. Usually hackers target particular Operating Systems or a Particular Controller. In spite of several ongoing researches Conventional Web Servers...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Aug 2011

    Temporal Databases and Frequent Pattern Mining Techniques

    Data mining is the process of exploring and analyzing data from different perspective, using automatic or semiautomatic techniques to extract knowledge or useful information and discover correlations or meaningful patterns and rules from large databases. One of the most vital characteristic missed by the traditional data mining systems is their...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Nov 2012

    Search in Unstructured Peer-to-Peer Networks Based on Dynamic Topology Adaptation

    Peer-To-Peer networks (P2P) have gained great attention and popularity. One key challenge aspect in Unstructured P2P resource sharing environments is efficient searching algorithm. Flooding and Random Walk (RW) are two typical search algorithms. Flooding searches aggressively and covers most nodes but it generates large amount of query messages. RW searches...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY

  • White Papers // Jun 2012

    A Novel Leader Based Reputation Approach for Mobile Ad Hoc Networks

    A Mobile Ad hoc NETwork (MANET) is more vulnerable to routing attacks due to its open nature of medium, decentralized administration, lack of security, dynamic network topology, multi-hop routing, energy limited operation, lack of scalability etc. There are high probabilities for misbehaving node to launch any kind of attack in...

    Provided By MANONMANIAM SUNDARANAR UNIVERSITY