MES College of Engineering

Displaying 1-19 of 19 results

  • White Papers // Jan 2012

    Self Organized Public Key Certificate in Ad Hoc Networks

    This paper is to propose a completely self-organized public key system for ad hoc wireless networks. This makes use of absolutely no infrastructure-Trusted Third Party, Certificate Authority, or server-even during initial configurations. The authors' solution of fully self-organized public-key management system allows users to generate their public-private key pairs, to...

    Provided By MES College of Engineering

  • White Papers // Jan 2012

    Deployment of Session Initiation Protocol in Ad-Hoc Networks: A Decentralized Approach

    Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing network entities. Applications and protocols designed for centralized environments must be adapted for use in ad-hoc environments. For example, the baseline Session Initiation Protocol (SIP) strongly relies on the presence of an infrastructure, the...

    Provided By MES College of Engineering

  • White Papers // Jun 2011

    Wireless Sensor Network for Monitoring Accidents Continuously Using Zigbee

    In this paper, the authors presented the Wireless Sensor Network (WSN) for Monitoring accidents Continuously Using Zigbee. The output of accident sensor has to be transmitted via Zigbee and the same has to be sent to the remote wireless monitor for acquiring the observed accident signal. The remote wireless monitor...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Router Aided Congestion Control Techniques

    End-to-End packet delay is one of the canonical metrics in Internet Protocol (IP) networks and is important both from the network operator and application performance points of view. The motivation for the present work is a detailed knowledge and understanding of such "Through-router" delays. A thorough examination of delay leads...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Face Detection by Skin Color and Feature Extractions

    In this paper a method is introduced that detects human faces in color images by first separating skin regions from non-skin regions and then locating faces within skin regions. A chroma chart is prepared that shows likelihoods of different colors representing the skin. Using the chroma chart, a color image...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Quality Measurement of Watermarked Biometric Images Using SSIM Index

    Watermarking biometric images is advancing very fast with the need for increased security for the biometric data. Reversible watermarking is very important development in this area as the original image can be completely recovered in this. But studies in this area are very less. Since the low quality of watermarked...

    Provided By MES College of Engineering

  • White Papers // May 2011

    An ARIMA Based Model for the Real Time Prediction of VBR Video Traffic

    Network traffic prediction plays a vital role in the optimal resource allocation and management in computer networks. This paper introduces an ARIMA based model for the real time prediction of VBR video traffic. The methodology presented here can successfully addresses the challenges in traffic prediction such as accuracy in prediction,...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Digital Dossier Aggregation and Defence by Online Social Networking Sites

    The highly welcomed concept of web 2.0 and thereby social networking sites played a main role for the availability of large amount of personally identifiable data online. Recent studies shows that apart from traditional network attacks targeted on social networking sites, attacks for the sensitive personal data got more focus....

    Provided By MES College of Engineering

  • White Papers // May 2011

    Inputting Mathematical Expressions at Runtime in C

    The problem of inputting a mathematical expression at runtime in C is generally considered very difficult. The general approach to solve the problem is to include specialized parser packages as header files. It appears that such packages are available only for advanced versions of C like C++ or C#. In...

    Provided By MES College of Engineering

  • White Papers // May 2011

    An Efficient Method for Graphic Password Authentication

    The authors propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of images. The next image is based on the previous click-point. They present the results of an initial user study which...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Privacy for Mobile Users in Location-Based Services

    The emerging location-detection devices together with ubiquitous connectivity have enabled a large variety of Location-Based Services (LBS). Location-based services are becoming popular for mobile users. The mobile users' location plays a key role to provide the service from one side, but it can be considered as a dimension of their...

    Provided By MES College of Engineering

  • White Papers // May 2011

    An Integrated Model for Access Control and Encryption of Data in Database

    As organization increases their reliance on information systems for daily business increases, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Traditionally, database security uses techniques like encryption and securely sharing of the data. They primarily focus on creating user accounts and managing user...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Encryption on MP3 Compression

    This paper presents an encryption technique for the audio which is applied at the time of compression. Encryption algorithms are used to provide security to the multimedia data. Here, Advanced Encryption Standard (AES) encryption is applied on the quantized audio data which is performed before the Huffman's entropy coding. Experimental...

    Provided By MES College of Engineering

  • White Papers // May 2011

    A Survey on Link/Node-Disjoint On-Demand Multipath Routing Protocols in MANET

    Ad-hoc wireless networks are self-organising, infrastructureless networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communication with each other through radio-links in multi-hop specified routing protocols. In recent years, multipath routing protocols have attracted the attention of several researchers due to their...

    Provided By MES College of Engineering

  • White Papers // May 2011

    A Survey of Hierarchical Routing Protocols in Wireless Sensor Network

    In the research area of wireless sensor networks the routing protocol is a major issue. In this paper, the authors intend to discuss some of the major hierarchical routing protocols for wireless sensor networks. First, they will discuss the routing protocols in short and later they will compare the behavior...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Performance Analysis of DSR, AODV, FSR and ZRP Routing Protocols in MANET

    Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that are arbitrarily located so that the interconnections between nodes are dynamically changing. In MANET mobile nodes forms a temporary network without the use of any existing network infrastructure or centralized administration. A routing protocol is used to find...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Dynamic Web Service Composition Problems and Solution -A Survey

    Since the web has evolved as a service provider in all areas, there are few problems which are to be handled. Some challenges faced by web services are related to security, quality of service and composition. Among all the challenges, web service composition turns out to be an area of...

    Provided By MES College of Engineering

  • White Papers // Feb 2011

    Cluster Building in Distributed Wireless Sensor Networks

    The main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes. This paper proposes a new centralized clustering method for a data collection mechanism in wireless sensor networks, which is base don network energy maps and Quality-of-Service (QoS) requirements. The clustering problem...

    Provided By MES College of Engineering

  • White Papers // Jan 2011

    Cloud Based Virtual Tamil Operating System

    This paper deals with the On-going project titled "Virtual Tamil Operating System", which provides the permanent solution for long-term dream of Tamil-computing World, by providing Cloud-computing based permanent Tamil interface for 7 crore Tamil people. An operating system is a program that provides a simplified view of the hardware to...

    Provided By MES College of Engineering

  • White Papers // Jan 2012

    Self Organized Public Key Certificate in Ad Hoc Networks

    This paper is to propose a completely self-organized public key system for ad hoc wireless networks. This makes use of absolutely no infrastructure-Trusted Third Party, Certificate Authority, or server-even during initial configurations. The authors' solution of fully self-organized public-key management system allows users to generate their public-private key pairs, to...

    Provided By MES College of Engineering

  • White Papers // Jan 2012

    Deployment of Session Initiation Protocol in Ad-Hoc Networks: A Decentralized Approach

    Ad-hoc networks constitute a peculiar computing environment, characterized by the lack of centralized support from pre-existing network entities. Applications and protocols designed for centralized environments must be adapted for use in ad-hoc environments. For example, the baseline Session Initiation Protocol (SIP) strongly relies on the presence of an infrastructure, the...

    Provided By MES College of Engineering

  • White Papers // Feb 2011

    Cluster Building in Distributed Wireless Sensor Networks

    The main challenge in wireless sensor network deployment pertains to optimizing energy consumption when collecting data from sensor nodes. This paper proposes a new centralized clustering method for a data collection mechanism in wireless sensor networks, which is base don network energy maps and Quality-of-Service (QoS) requirements. The clustering problem...

    Provided By MES College of Engineering

  • White Papers // Jan 2011

    Cloud Based Virtual Tamil Operating System

    This paper deals with the On-going project titled "Virtual Tamil Operating System", which provides the permanent solution for long-term dream of Tamil-computing World, by providing Cloud-computing based permanent Tamil interface for 7 crore Tamil people. An operating system is a program that provides a simplified view of the hardware to...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Inputting Mathematical Expressions at Runtime in C

    The problem of inputting a mathematical expression at runtime in C is generally considered very difficult. The general approach to solve the problem is to include specialized parser packages as header files. It appears that such packages are available only for advanced versions of C like C++ or C#. In...

    Provided By MES College of Engineering

  • White Papers // May 2011

    An Efficient Method for Graphic Password Authentication

    The authors propose and examine the usability and security of Cued Click Points (CCP), a cued-recall graphical password technique. Users click on one point per image for a sequence of images. The next image is based on the previous click-point. They present the results of an initial user study which...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Privacy for Mobile Users in Location-Based Services

    The emerging location-detection devices together with ubiquitous connectivity have enabled a large variety of Location-Based Services (LBS). Location-based services are becoming popular for mobile users. The mobile users' location plays a key role to provide the service from one side, but it can be considered as a dimension of their...

    Provided By MES College of Engineering

  • White Papers // May 2011

    An Integrated Model for Access Control and Encryption of Data in Database

    As organization increases their reliance on information systems for daily business increases, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Traditionally, database security uses techniques like encryption and securely sharing of the data. They primarily focus on creating user accounts and managing user...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Encryption on MP3 Compression

    This paper presents an encryption technique for the audio which is applied at the time of compression. Encryption algorithms are used to provide security to the multimedia data. Here, Advanced Encryption Standard (AES) encryption is applied on the quantized audio data which is performed before the Huffman's entropy coding. Experimental...

    Provided By MES College of Engineering

  • White Papers // May 2011

    A Survey on Link/Node-Disjoint On-Demand Multipath Routing Protocols in MANET

    Ad-hoc wireless networks are self-organising, infrastructureless networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communication with each other through radio-links in multi-hop specified routing protocols. In recent years, multipath routing protocols have attracted the attention of several researchers due to their...

    Provided By MES College of Engineering

  • White Papers // Jun 2011

    Wireless Sensor Network for Monitoring Accidents Continuously Using Zigbee

    In this paper, the authors presented the Wireless Sensor Network (WSN) for Monitoring accidents Continuously Using Zigbee. The output of accident sensor has to be transmitted via Zigbee and the same has to be sent to the remote wireless monitor for acquiring the observed accident signal. The remote wireless monitor...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Router Aided Congestion Control Techniques

    End-to-End packet delay is one of the canonical metrics in Internet Protocol (IP) networks and is important both from the network operator and application performance points of view. The motivation for the present work is a detailed knowledge and understanding of such "Through-router" delays. A thorough examination of delay leads...

    Provided By MES College of Engineering

  • White Papers // May 2011

    A Survey of Hierarchical Routing Protocols in Wireless Sensor Network

    In the research area of wireless sensor networks the routing protocol is a major issue. In this paper, the authors intend to discuss some of the major hierarchical routing protocols for wireless sensor networks. First, they will discuss the routing protocols in short and later they will compare the behavior...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Performance Analysis of DSR, AODV, FSR and ZRP Routing Protocols in MANET

    Mobile Ad hoc NETwork (MANET) is a collection of mobile nodes that are arbitrarily located so that the interconnections between nodes are dynamically changing. In MANET mobile nodes forms a temporary network without the use of any existing network infrastructure or centralized administration. A routing protocol is used to find...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Face Detection by Skin Color and Feature Extractions

    In this paper a method is introduced that detects human faces in color images by first separating skin regions from non-skin regions and then locating faces within skin regions. A chroma chart is prepared that shows likelihoods of different colors representing the skin. Using the chroma chart, a color image...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Quality Measurement of Watermarked Biometric Images Using SSIM Index

    Watermarking biometric images is advancing very fast with the need for increased security for the biometric data. Reversible watermarking is very important development in this area as the original image can be completely recovered in this. But studies in this area are very less. Since the low quality of watermarked...

    Provided By MES College of Engineering

  • White Papers // May 2011

    An ARIMA Based Model for the Real Time Prediction of VBR Video Traffic

    Network traffic prediction plays a vital role in the optimal resource allocation and management in computer networks. This paper introduces an ARIMA based model for the real time prediction of VBR video traffic. The methodology presented here can successfully addresses the challenges in traffic prediction such as accuracy in prediction,...

    Provided By MES College of Engineering

  • White Papers // May 2011

    Digital Dossier Aggregation and Defence by Online Social Networking Sites

    The highly welcomed concept of web 2.0 and thereby social networking sites played a main role for the availability of large amount of personally identifiable data online. Recent studies shows that apart from traditional network attacks targeted on social networking sites, attacks for the sensitive personal data got more focus....

    Provided By MES College of Engineering

  • White Papers // May 2011

    Dynamic Web Service Composition Problems and Solution -A Survey

    Since the web has evolved as a service provider in all areas, there are few problems which are to be handled. Some challenges faced by web services are related to security, quality of service and composition. Among all the challenges, web service composition turns out to be an area of...

    Provided By MES College of Engineering