Maulana Azad National Institute of Technology

Displaying 1-21 of 21 results

  • White Papers // Dec 2012

    Analysis of Hybrid Routing Protocol with Table Driven and On Demand Routing Protocol

    Mobile Ad hoc networks are characterized by dynamic topology caused by random node mobility Routing is a key issue in MANET, as there is no central administrator and also there is no dedicated routers to find the next hop, all these tasks are performed by the mobile nodes itself. To...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jan 2012

    Energy Efficient Maximum Lifetime Routing for Wireless Sensor Network

    In wireless sensor network, sensors or nodes are generally battery powered devices. These nodes have limited amount of initial energy that are consumed at different rates, depending on the power level. For maximizing the lifetime of these nodes most routing algorithm in wireless sensor networks uses the energy efficient path....

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Dec 2011

    A Survey of Embedded Software Profiling Methodologies

    Embedded Systems combine one or more processor cores with dedicated logic running on an ASIC or FPGA to meet design goals at reasonable cost. It is achieved by profiling the application with variety of aspects like performance, memory usage, cache hit versus cache miss, energy consumption, etc. Out of these,...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Oct 2011

    A Survey on Different Security Techniques of Mobile Code

    Mobile agents are software which moves autonomously through a computer network with aim to perform some computation or gather information on behalf of its creator or an application. In the last several years, mobile agents have proved its numerous applications including e-commerce. In most applications, the security of mobile agents...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2011

    Reliability and Maintainability of Passive Optical Component

    The reliability of the entire communications network is dependent on the reliability of each single element. Even though redundant transmission systems allow higher reliability, the OPEX (OPerational EXpenditure) caused by maintenance costs can be minimized if reliable components are used. Capacity of optical communications networks has increased rapidly in the...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2011

    Security Solution for WSN Using Mobile Agent Technology

    Wireless Sensor Network (WSN) have diverse field of application, but it is very much prone to the security threats. The different types of security attack which limits its application in various unsecure environments are sink Hole Attack, Sybil attack, wormhole attack, node replication attack etc. Any security measures need to...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2011

    A Review Paper on Cooperative Blackhole and Grayhole Attacks in Mobile Ad Hoc Networks

    This paper presents a review on a major category of coordinated attacks i.e. cooperative blackhole / grayhole attack which are a serious threat to ad hoc network security. In cooperative blackhole attack multiple nodes collude to hide the malicious activity of other nodes; hence such attacks are more difficult to...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2011

    Energy Efficient Clear Channel Assessment for LR-WPAN

    IEEE 802.15.4 LR-WPAN is a specification for low-cost, low-powered and low data rate transmission. This standard uses CSMA/CA protocol for contention resolution. One of the tasks performed by CSMA/CA algorithm is Clear Channel Assessment (CCA), used to find the status (IDLE or BUSY) of the channel. There are three operating...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2011

    Energy Efficient Routing Algorithm for Maximizing the Minimum Lifetime of Wireless Sensor Network: A Review

    In wireless sensor network, devices or nodes are generally battery powered devices. These nodes have limited amount of initial energy that are consumed at different rates, depending on the power level. The lifetime of the network is defined as the time until the first node fails (or runs out of...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // May 2011

    MODSPIRITE: A Credit Based Solution to Enforce Node Cooperation in an Ad-Hoc Network

    In an Ad-hoc network, node cooperation is an important factor for successful data transmission among nodes. Most of the routing protocols are based on the assumption that the intermediate node cooperates during data transmission from source node to destination. However, because mobile nodes are constrained by limited energy, bandwidth and...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Mar 2011

    Detection and Isolation of Reluctant Nodes Using Reputation Based Scheme in an Ad-Hoc Network

    In an ad hoc network, the transmission range of nodes is limited; hence nodes mutually cooperate with its neighbouring nodes in order to extend the overall communication. However, along with the cooperative nodes, there may be some reluctant nodes like selfish nodes and malicious nodes present in the network. Such...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Dec 2010

    RTS-AC: Admission Control Method for IEEE 802.11e WLANs

    In wireless LAN an important concern is channel utilization. IEEE 802.11e TGe propose Transmission OPportunity (TXOP) scheme with admission control method in which a station is allowed to send a number of consecutive packets limited by the duration allocated and station accepts or rejects the flows on the basis of...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jul 2010

    Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET

    Mobile Ad hoc NETwork (MANET) is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // May 2010

    Hello Flood Attack and Its Countermeasures in Wireless Sensor Networks

    Wireless sensor network have emerged as an important application of the ad-hoc networks paradigm, such as for monitoring physical environment. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jan 2010

    A Model for Mining Multilevel Fuzzy Association Rule in Database

    The problem of developing models and algorithms for multilevel association mining pose for new challenges for mathematics and computer science. These problems become more challenging, when some form of uncertainty like fuzziness is present in data or relationships in data. This paper proposes a multilevel fuzzy association rule mining models...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Nov 2009

    Performance Analysis of Mobile Ad-Hoc Network Using AODV Protocol

    This research paper proposes a new protocol that modifies AODV to improve its Performance using Ant Colony algorithm. The mobility behaviour of nodes in the application is modelled by the random waypoint model through which random locations to which a node move are generated, and the associated speed and pause...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Oct 2009

    Prototype System for Retrieval of Remote Sensing Images Based on Color Moment and Gray Level Co-Occurrence Matrix

    The remote sensing image archive is increasing day by day. The storage, organization and retrieval of these images poses a challenge to the scientific community. In this paper the authors have developed a system for retrieval of remote sensing images on the basis of color moment and gray level co-occurrence...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2009

    Rossler Nonlinear Dynamical Machine for Cryptography Applications

    In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful. In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jul 2009

    A Proposed Algorithm to Improve Security & Efficiency of SSL-TLS Servers Using Batch RSA Decryption

    Today, Internet becomes the essential part of the lives. Over 90% of the e-commerce is developed on the Internet. A security algorithm became very necessary for producer-client transactions assurance and the financial applications safety (credit cards, etc.) The RSA algorithm applicability derives from algorithm properties like: confidentiality, safe authentication, data...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2009

    A Rough Sets Partitioning Model for Mining Sequential Patterns With Time Constraint

    Now a days, data mining and knowledge discovery methods are applied to a variety of enterprise and engineering disciplines to uncover interesting patterns from databases. The study of Sequential patterns is an important data mining problem due to its wide applications to real world time dependent databases. Sequential patterns are...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2009

    Integrated Optical Wireless Network for Next Generation Wireless Systems

    This paper suggests a modified millimeter wave wireless system using Orthogonal Frequency Division Multiplexing (OFDM) technique, integrated with optical fiber as a feeder network. Here it has investigated how well OFDM performs when transmitted over the wireless channel and Multi Mode Optical Fiber (MMOF) channel for various S/N values &...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Oct 2011

    A Survey on Different Security Techniques of Mobile Code

    Mobile agents are software which moves autonomously through a computer network with aim to perform some computation or gather information on behalf of its creator or an application. In the last several years, mobile agents have proved its numerous applications including e-commerce. In most applications, the security of mobile agents...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Dec 2012

    Analysis of Hybrid Routing Protocol with Table Driven and On Demand Routing Protocol

    Mobile Ad hoc networks are characterized by dynamic topology caused by random node mobility Routing is a key issue in MANET, as there is no central administrator and also there is no dedicated routers to find the next hop, all these tasks are performed by the mobile nodes itself. To...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2009

    Integrated Optical Wireless Network for Next Generation Wireless Systems

    This paper suggests a modified millimeter wave wireless system using Orthogonal Frequency Division Multiplexing (OFDM) technique, integrated with optical fiber as a feeder network. Here it has investigated how well OFDM performs when transmitted over the wireless channel and Multi Mode Optical Fiber (MMOF) channel for various S/N values &...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Nov 2009

    Performance Analysis of Mobile Ad-Hoc Network Using AODV Protocol

    This research paper proposes a new protocol that modifies AODV to improve its Performance using Ant Colony algorithm. The mobility behaviour of nodes in the application is modelled by the random waypoint model through which random locations to which a node move are generated, and the associated speed and pause...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // May 2010

    Hello Flood Attack and Its Countermeasures in Wireless Sensor Networks

    Wireless sensor network have emerged as an important application of the ad-hoc networks paradigm, such as for monitoring physical environment. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jan 2010

    A Model for Mining Multilevel Fuzzy Association Rule in Database

    The problem of developing models and algorithms for multilevel association mining pose for new challenges for mathematics and computer science. These problems become more challenging, when some form of uncertainty like fuzziness is present in data or relationships in data. This paper proposes a multilevel fuzzy association rule mining models...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Mar 2011

    Detection and Isolation of Reluctant Nodes Using Reputation Based Scheme in an Ad-Hoc Network

    In an ad hoc network, the transmission range of nodes is limited; hence nodes mutually cooperate with its neighbouring nodes in order to extend the overall communication. However, along with the cooperative nodes, there may be some reluctant nodes like selfish nodes and malicious nodes present in the network. Such...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2009

    Rossler Nonlinear Dynamical Machine for Cryptography Applications

    In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful. In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2009

    A Rough Sets Partitioning Model for Mining Sequential Patterns With Time Constraint

    Now a days, data mining and knowledge discovery methods are applied to a variety of enterprise and engineering disciplines to uncover interesting patterns from databases. The study of Sequential patterns is an important data mining problem due to its wide applications to real world time dependent databases. Sequential patterns are...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jul 2009

    A Proposed Algorithm to Improve Security & Efficiency of SSL-TLS Servers Using Batch RSA Decryption

    Today, Internet becomes the essential part of the lives. Over 90% of the e-commerce is developed on the Internet. A security algorithm became very necessary for producer-client transactions assurance and the financial applications safety (credit cards, etc.) The RSA algorithm applicability derives from algorithm properties like: confidentiality, safe authentication, data...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jul 2010

    Detection of Packet Dropping Attack Using Improved Acknowledgement Based Scheme in MANET

    Mobile Ad hoc NETwork (MANET) is self configuring network of mobile node connected by wireless links and considered as network without infrastructure. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Oct 2009

    Prototype System for Retrieval of Remote Sensing Images Based on Color Moment and Gray Level Co-Occurrence Matrix

    The remote sensing image archive is increasing day by day. The storage, organization and retrieval of these images poses a challenge to the scientific community. In this paper the authors have developed a system for retrieval of remote sensing images on the basis of color moment and gray level co-occurrence...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2011

    Energy Efficient Clear Channel Assessment for LR-WPAN

    IEEE 802.15.4 LR-WPAN is a specification for low-cost, low-powered and low data rate transmission. This standard uses CSMA/CA protocol for contention resolution. One of the tasks performed by CSMA/CA algorithm is Clear Channel Assessment (CCA), used to find the status (IDLE or BUSY) of the channel. There are three operating...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // May 2011

    MODSPIRITE: A Credit Based Solution to Enforce Node Cooperation in an Ad-Hoc Network

    In an Ad-hoc network, node cooperation is an important factor for successful data transmission among nodes. Most of the routing protocols are based on the assumption that the intermediate node cooperates during data transmission from source node to destination. However, because mobile nodes are constrained by limited energy, bandwidth and...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Dec 2010

    RTS-AC: Admission Control Method for IEEE 802.11e WLANs

    In wireless LAN an important concern is channel utilization. IEEE 802.11e TGe propose Transmission OPportunity (TXOP) scheme with admission control method in which a station is allowed to send a number of consecutive packets limited by the duration allocated and station accepts or rejects the flows on the basis of...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2011

    Security Solution for WSN Using Mobile Agent Technology

    Wireless Sensor Network (WSN) have diverse field of application, but it is very much prone to the security threats. The different types of security attack which limits its application in various unsecure environments are sink Hole Attack, Sybil attack, wormhole attack, node replication attack etc. Any security measures need to...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jun 2011

    Energy Efficient Routing Algorithm for Maximizing the Minimum Lifetime of Wireless Sensor Network: A Review

    In wireless sensor network, devices or nodes are generally battery powered devices. These nodes have limited amount of initial energy that are consumed at different rates, depending on the power level. The lifetime of the network is defined as the time until the first node fails (or runs out of...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Jan 2012

    Energy Efficient Maximum Lifetime Routing for Wireless Sensor Network

    In wireless sensor network, sensors or nodes are generally battery powered devices. These nodes have limited amount of initial energy that are consumed at different rates, depending on the power level. For maximizing the lifetime of these nodes most routing algorithm in wireless sensor networks uses the energy efficient path....

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2011

    A Review Paper on Cooperative Blackhole and Grayhole Attacks in Mobile Ad Hoc Networks

    This paper presents a review on a major category of coordinated attacks i.e. cooperative blackhole / grayhole attack which are a serious threat to ad hoc network security. In cooperative blackhole attack multiple nodes collude to hide the malicious activity of other nodes; hence such attacks are more difficult to...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Dec 2011

    A Survey of Embedded Software Profiling Methodologies

    Embedded Systems combine one or more processor cores with dedicated logic running on an ASIC or FPGA to meet design goals at reasonable cost. It is achieved by profiling the application with variety of aspects like performance, memory usage, cache hit versus cache miss, energy consumption, etc. Out of these,...

    Provided By Maulana Azad National Institute of Technology

  • White Papers // Sep 2011

    Reliability and Maintainability of Passive Optical Component

    The reliability of the entire communications network is dependent on the reliability of each single element. Even though redundant transmission systems allow higher reliability, the OPEX (OPerational EXpenditure) caused by maintenance costs can be minimized if reliable components are used. Capacity of optical communications networks has increased rapidly in the...

    Provided By Maulana Azad National Institute of Technology