National Institute of Technology Karnataka

Displaying 1-19 of 19 results

  • White Papers // Nov 2012

    Homogeneous Multi-Interface Mobile Node Support in NS2

    NS2 is a widely used, open source tool for network simulation. A Mobile Node (MN) in NS2 by default provides only a single Wi-Fi interface. It makes difficult for users to simulate the scenario where a mobile node is connected to multiple networks through different interfaces at the same time....

    Provided By National Institute of Technology Karnataka

  • White Papers // Aug 2012

    An Approach to Quantify the Loss Reduction due to Distributed Generation

    Line Loss Reduction is one of the major benefits of Distributed Generation, amongst many others, when incorporated in the Power Distribution System. The quantum of the line loss reduction should be exactly known to assess the effectiveness of the distributed generation. In this paper, the total loss of a practical...

    Provided By National Institute of Technology Karnataka

  • White Papers // May 2011

    Fast Face Detection Using Graphics Processor

    Fast face detection is one of the key components of various computer vision applications. Viola-Jones algorithm provides a good and fast detection for low and medium resolution images. This paper proposes a new and fast approach to perform real time face detection. The proposed method includes the enhanced Haar-like features...

    Provided By National Institute of Technology Karnataka

  • White Papers // May 2011

    Adaptive Multi-Model Biometric Fusion for Digital Watermarking

    In this paper the authors propose to embed a fused biometric feature vector as a watermark into the sample image in spatial domain based on the fusion parameter (for embedding the watermark) which is chosen adaptively by using the structural similarity measure. Further the watermark is extracted from the subject...

    Provided By National Institute of Technology Karnataka

  • White Papers // Mar 2011

    Analysis of Energy Efficient Clustering Algorithm for Wireless Sensor Networks

    Data gathering is a common but critical operation in many applications of wireless sensor networks. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks, which can increase network scalability and lifetime. Clustering sensors into...

    Provided By National Institute of Technology Karnataka

  • White Papers // Feb 2011

    A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication

    This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret's very existence is concealed. The term 'Steganography' describes the method...

    Provided By National Institute of Technology Karnataka

  • White Papers // Dec 2010

    Secure Routing Protocols in Ad Hoc Networks: A Review

    Mobile Ad hoc wireless NETworks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from na?ve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery...

    Provided By National Institute of Technology Karnataka

  • White Papers // Dec 2010

    Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions

    The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret's very existence is concealed. The term 'Steganography' describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This...

    Provided By National Institute of Technology Karnataka

  • White Papers // Oct 2010

    Regulating Response Time in an Autonomic Computing System: A Comparison of Proportional Control and Fuzzy Control Approaches

    Ecommerce is an area where an Autonomic Computing system could be very effectively deployed. Ecommerce has created demand for high quality information technology services and businesses are seeking quality of service guarantees from their service providers. These guarantees are expressed as part of service level agreements. Properly adjusting tuning parameters...

    Provided By National Institute of Technology Karnataka

  • White Papers // Oct 2010

    WAP Based Seamless Roaming in Urban Environment With Wise Handoff Technique

    This paper highlights the studies performed to arrive at a novel handoff scheme in achieving uninterrupted connectivity. Every wireless communication user prefers seamless mobility and uninterrupted communication. Achieving this scenario is quite challenging both technologically and economically. Few of the reasons are geographical and man made constraints. Dynamic changes in...

    Provided By National Institute of Technology Karnataka

  • White Papers // Sep 2010

    Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks

    Efficient resource discovery and availability improvement are very important issues in unstructured P2P networks. In this paper, a bio-inspired resource discovery scheme inspired by the principle of elephants migration is proposed. A replication scheme based on Q-learning and erasure codes is also introduced. Simulation results show that the proposed schemes...

    Provided By National Institute of Technology Karnataka

  • White Papers // Apr 2010

    Reconstruction of Gene Networks Using Phenomic Algorithms

    The reconstruction of gene networks has become an important activity in Systems Biology. The potential for better methods of drug discovery and disease diagnosis hinges upon the understanding of the interaction networks between the genes. Evolutionary methods are proving to be successful in such problems and a number of such...

    Provided By National Institute of Technology Karnataka

  • White Papers // Oct 2009

    Hierarchical Approach for Key Management in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for this new...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jul 2009

    Analyzing and Reducing the Attack Surface for a Cloud-Ready Application

    Cloud Computing holds the potential to use computing infrastructure without owning it; it also holds the potential to be Green for sharing resources; therefore, Cloud Computing is attracting lot of attention from researchers, industry, and public. Security is one of the major concerns in Cloud; because, in cloud, platform, infrastructure,...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jul 2009

    HTTPattack: An Open Source Web Stress Tool

    DDoS attacks have become a major threat to web servers. Hence there is a need to test a website for various vulnerabilities that can lead to various exploitations before deployment. Application specific solutions need to be built. To test such solutions and various research concepts, good commercial tools are not...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jul 2009

    Preventing Image Based Cross Site Request Forgery Attacks

    Cross Site Request Forgery (CSRF) is an attack on web applications which exploits the trust of authenticated users. This attack allows a partially compromised site to make arbitrary HTTP requests on behalf of victim user who is currently logged in to a site. Currently very few defensive mechanisms like secret...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jun 2009

    The Minimum PAPR Code for OFDM Systems

    In this paper, a block code to minimize the Peak-to-Average Power Ratio (PAPR) of Orthogonal Frequency Division Multiplexing (OFDM) signals is proposed. It is shown that cyclic shift and codeword inversion cause no change to peak envelope power. The encoding rule for the proposed code comprises of searching for a...

    Provided By National Institute of Technology Karnataka

  • White Papers // Mar 2009

    Review of Replication Schemes for Unstructured P2P Networks

    To improve unstructured P2P system performance, one wants to minimize the number of peers that have to be probed for the shortening of the search time. A solution to the problem is to employ a replication scheme, which provides high hit rate for target files. Replication can also provide load...

    Provided By National Institute of Technology Karnataka

  • White Papers // Feb 2009

    Suraksha: A Security Designers' Workbench

    To design a secure software system, a security designer needs a workbench so that security of the system can be embedded into the system from the very early stages of Software Development Life Cycle (SDLC). Among the proposed approaches to elicit security aspects in the early stages of SDLC, researchers...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jul 2009

    HTTPattack: An Open Source Web Stress Tool

    DDoS attacks have become a major threat to web servers. Hence there is a need to test a website for various vulnerabilities that can lead to various exploitations before deployment. Application specific solutions need to be built. To test such solutions and various research concepts, good commercial tools are not...

    Provided By National Institute of Technology Karnataka

  • White Papers // Feb 2009

    Suraksha: A Security Designers' Workbench

    To design a secure software system, a security designer needs a workbench so that security of the system can be embedded into the system from the very early stages of Software Development Life Cycle (SDLC). Among the proposed approaches to elicit security aspects in the early stages of SDLC, researchers...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jul 2009

    Preventing Image Based Cross Site Request Forgery Attacks

    Cross Site Request Forgery (CSRF) is an attack on web applications which exploits the trust of authenticated users. This attack allows a partially compromised site to make arbitrary HTTP requests on behalf of victim user who is currently logged in to a site. Currently very few defensive mechanisms like secret...

    Provided By National Institute of Technology Karnataka

  • White Papers // Sep 2010

    Protocols for Bio-Inspired Resource Discovery and Erasure Coded Replication in P2P Networks

    Efficient resource discovery and availability improvement are very important issues in unstructured P2P networks. In this paper, a bio-inspired resource discovery scheme inspired by the principle of elephants migration is proposed. A replication scheme based on Q-learning and erasure codes is also introduced. Simulation results show that the proposed schemes...

    Provided By National Institute of Technology Karnataka

  • White Papers // Mar 2009

    Review of Replication Schemes for Unstructured P2P Networks

    To improve unstructured P2P system performance, one wants to minimize the number of peers that have to be probed for the shortening of the search time. A solution to the problem is to employ a replication scheme, which provides high hit rate for target files. Replication can also provide load...

    Provided By National Institute of Technology Karnataka

  • White Papers // Apr 2010

    Reconstruction of Gene Networks Using Phenomic Algorithms

    The reconstruction of gene networks has become an important activity in Systems Biology. The potential for better methods of drug discovery and disease diagnosis hinges upon the understanding of the interaction networks between the genes. Evolutionary methods are proving to be successful in such problems and a number of such...

    Provided By National Institute of Technology Karnataka

  • White Papers // Oct 2010

    Regulating Response Time in an Autonomic Computing System: A Comparison of Proportional Control and Fuzzy Control Approaches

    Ecommerce is an area where an Autonomic Computing system could be very effectively deployed. Ecommerce has created demand for high quality information technology services and businesses are seeking quality of service guarantees from their service providers. These guarantees are expressed as part of service level agreements. Properly adjusting tuning parameters...

    Provided By National Institute of Technology Karnataka

  • White Papers // Oct 2010

    WAP Based Seamless Roaming in Urban Environment With Wise Handoff Technique

    This paper highlights the studies performed to arrive at a novel handoff scheme in achieving uninterrupted connectivity. Every wireless communication user prefers seamless mobility and uninterrupted communication. Achieving this scenario is quite challenging both technologically and economically. Few of the reasons are geographical and man made constraints. Dynamic changes in...

    Provided By National Institute of Technology Karnataka

  • White Papers // Dec 2010

    Two New Approaches for Secured Image Steganography Using Cryptographic Techniques and Type Conversions

    The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret's very existence is concealed. The term 'Steganography' describes the method of hiding cognitive content in another medium to avoid detection by the intruders. This...

    Provided By National Institute of Technology Karnataka

  • White Papers // Oct 2009

    Hierarchical Approach for Key Management in Mobile Ad Hoc Networks

    Mobile Ad-hoc NETwork (MANET) is a collection of autonomous nodes or terminals which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. The conventional security solutions to provide key management through accessing trusted authorities or centralized servers are infeasible for this new...

    Provided By National Institute of Technology Karnataka

  • White Papers // May 2011

    Adaptive Multi-Model Biometric Fusion for Digital Watermarking

    In this paper the authors propose to embed a fused biometric feature vector as a watermark into the sample image in spatial domain based on the fusion parameter (for embedding the watermark) which is chosen adaptively by using the structural similarity measure. Further the watermark is extracted from the subject...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jun 2009

    The Minimum PAPR Code for OFDM Systems

    In this paper, a block code to minimize the Peak-to-Average Power Ratio (PAPR) of Orthogonal Frequency Division Multiplexing (OFDM) signals is proposed. It is shown that cyclic shift and codeword inversion cause no change to peak envelope power. The encoding rule for the proposed code comprises of searching for a...

    Provided By National Institute of Technology Karnataka

  • White Papers // Dec 2010

    Secure Routing Protocols in Ad Hoc Networks: A Review

    Mobile Ad hoc wireless NETworks (MANETs) assume no existing infrastructure is available for routing packets end-to-end in a network and instead rely on intermediary peers. The nodes in MANET are subject to various attacks that range from na?ve eavesdropping to vicious battery draining attacks. Routing Protocols, data, bandwidth and battery...

    Provided By National Institute of Technology Karnataka

  • White Papers // May 2011

    Fast Face Detection Using Graphics Processor

    Fast face detection is one of the key components of various computer vision applications. Viola-Jones algorithm provides a good and fast detection for low and medium resolution images. This paper proposes a new and fast approach to perform real time face detection. The proposed method includes the enhanced Haar-like features...

    Provided By National Institute of Technology Karnataka

  • White Papers // Feb 2011

    A Novel Approach for Concealed Data Sharing and Data Embedding for Secured Communication

    This paper introduces a new method of securing image using cryptographic and steganographic techniques. The science of securing a data by encryption is Cryptography whereas the method of hiding secret messages in other messages is Steganography, so that the secret's very existence is concealed. The term 'Steganography' describes the method...

    Provided By National Institute of Technology Karnataka

  • White Papers // Mar 2011

    Analysis of Energy Efficient Clustering Algorithm for Wireless Sensor Networks

    Data gathering is a common but critical operation in many applications of wireless sensor networks. Innovative techniques that improve energy efficiency to prolong the network lifetime are highly required. Clustering is an effective topology control approach in wireless sensor networks, which can increase network scalability and lifetime. Clustering sensors into...

    Provided By National Institute of Technology Karnataka

  • White Papers // Nov 2012

    Homogeneous Multi-Interface Mobile Node Support in NS2

    NS2 is a widely used, open source tool for network simulation. A Mobile Node (MN) in NS2 by default provides only a single Wi-Fi interface. It makes difficult for users to simulate the scenario where a mobile node is connected to multiple networks through different interfaces at the same time....

    Provided By National Institute of Technology Karnataka

  • White Papers // Aug 2012

    An Approach to Quantify the Loss Reduction due to Distributed Generation

    Line Loss Reduction is one of the major benefits of Distributed Generation, amongst many others, when incorporated in the Power Distribution System. The quantum of the line loss reduction should be exactly known to assess the effectiveness of the distributed generation. In this paper, the total loss of a practical...

    Provided By National Institute of Technology Karnataka

  • White Papers // Jul 2009

    Analyzing and Reducing the Attack Surface for a Cloud-Ready Application

    Cloud Computing holds the potential to use computing infrastructure without owning it; it also holds the potential to be Green for sharing resources; therefore, Cloud Computing is attracting lot of attention from researchers, industry, and public. Security is one of the major concerns in Cloud; because, in cloud, platform, infrastructure,...

    Provided By National Institute of Technology Karnataka