National Institute of Technology Kurukshetra

Displaying 1-9 of 9 results

  • White Papers // Feb 2013

    Enhanced Availability Rate and Load Balance in Emerging Heterogeneous Wireless Network Using Proactive Group Vertical Handover Algorithm

    Future Heterogeneous Network (HetNet) will foster interoperability to achieve seamless multimedia services. To exploit the ubiquitous diversity across HetNet, Mobile Nodes (MNs) will prefer to perform Vertical Hand-Over (VHO) for better guaranteed Quality of Experience (QoE) and optimal resource utilization. To perform VHO, the radio frequency part of the emerging...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Dec 2011

    Improved Vertical Handover Decision Algorithm for UMTS-WLAN

    Next generation wireless systems consist of heterogeneous wireless networks. Wireless LAN (WLAN) and cellular mobile radio systems will be important part of heterogeneous networks. Universal Mobile Telecommunication System (UMTS) provides wide-area coverage, high mobility but relatively low data rate. WLAN is designed for low-range, high/medium data rate access, low mobility...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jul 2011

    A Semantic Web Engineering Model

    Web Engineering provides the systematic approach to the development of web applications. The Semantic Web is the extension of current Web and further the Semantic Web applications can be considered as the augmentation of web applications with ontological annotations. But, the efficient, reliable and systematic development of semantic web based...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jul 2011

    A Comparative Study of Various Routing Protocols in VANET

    Vehicular Ad Hoc NETworks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages/disadvantages and the applications of various routing protocols for...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jun 2011

    An Analysis of Speech Recognition Performance Based Upon Network Layers and Transfer Functions

    Speech is the most natural way of information exchange. It provides an efficient means of means of man-machine communication using speech interfacing. Speech interfacing involves speech synthesis and speech recognition. Speech recognition allows a computer to identify the words that a person speaks to a microphone or telephone. The two...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jan 2011

    Two New Protocols for Fault Tolerant Agreement

    The paper attempts to handle failures effectively, while reaching agreement, in a distributed transaction processing system. The standard protocols such as BFTDC, Zyzzyva and PBFT handle the problem to a greater extent. However, the limitation with these protocols is that they incur increased message overhead as well as large latency....

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Dec 2009

    Performance of Intrusion Detection System Using GRNN

    The steady growth in research on intrusion detection systems has created a demand for tools and methods to test their effectiveness. Intrusion Detection System (IDS), is based on the belief that an intruder's behaviour will be noticeably different from that of a legitimate user and would exploit security vulnerabilities. This...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jun 2009

    Real Time Approach for Data Placement in Wireless Sensor Networks

    The issue of real-time and reliable report delivery is extremely important for taking effective decision in a real world mission critical Wireless Sensor Network (WSN) based application. The sensor data behaves differently in many ways from the data in traditional databases. WSNs need a mechanism to register, process queries, and...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jun 2009

    Location Update Cost Analysis of Mobile IPv6 Protocols

    Mobile IP has been developed to provide the continuous information network access to mobile users. In IP-based mobile networks, location management is an important component of mobility management. This management enables the system to track the location of mobile node between consecutive communications. It includes two important tasks - location...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Dec 2011

    Improved Vertical Handover Decision Algorithm for UMTS-WLAN

    Next generation wireless systems consist of heterogeneous wireless networks. Wireless LAN (WLAN) and cellular mobile radio systems will be important part of heterogeneous networks. Universal Mobile Telecommunication System (UMTS) provides wide-area coverage, high mobility but relatively low data rate. WLAN is designed for low-range, high/medium data rate access, low mobility...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Feb 2013

    Enhanced Availability Rate and Load Balance in Emerging Heterogeneous Wireless Network Using Proactive Group Vertical Handover Algorithm

    Future Heterogeneous Network (HetNet) will foster interoperability to achieve seamless multimedia services. To exploit the ubiquitous diversity across HetNet, Mobile Nodes (MNs) will prefer to perform Vertical Hand-Over (VHO) for better guaranteed Quality of Experience (QoE) and optimal resource utilization. To perform VHO, the radio frequency part of the emerging...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jan 2011

    Two New Protocols for Fault Tolerant Agreement

    The paper attempts to handle failures effectively, while reaching agreement, in a distributed transaction processing system. The standard protocols such as BFTDC, Zyzzyva and PBFT handle the problem to a greater extent. However, the limitation with these protocols is that they incur increased message overhead as well as large latency....

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Dec 2009

    Performance of Intrusion Detection System Using GRNN

    The steady growth in research on intrusion detection systems has created a demand for tools and methods to test their effectiveness. Intrusion Detection System (IDS), is based on the belief that an intruder's behaviour will be noticeably different from that of a legitimate user and would exploit security vulnerabilities. This...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jun 2009

    Real Time Approach for Data Placement in Wireless Sensor Networks

    The issue of real-time and reliable report delivery is extremely important for taking effective decision in a real world mission critical Wireless Sensor Network (WSN) based application. The sensor data behaves differently in many ways from the data in traditional databases. WSNs need a mechanism to register, process queries, and...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jun 2009

    Location Update Cost Analysis of Mobile IPv6 Protocols

    Mobile IP has been developed to provide the continuous information network access to mobile users. In IP-based mobile networks, location management is an important component of mobility management. This management enables the system to track the location of mobile node between consecutive communications. It includes two important tasks - location...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jul 2011

    A Comparative Study of Various Routing Protocols in VANET

    Vehicular Ad Hoc NETworks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguished approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary for smart ITS. This paper discusses the advantages/disadvantages and the applications of various routing protocols for...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jun 2011

    An Analysis of Speech Recognition Performance Based Upon Network Layers and Transfer Functions

    Speech is the most natural way of information exchange. It provides an efficient means of means of man-machine communication using speech interfacing. Speech interfacing involves speech synthesis and speech recognition. Speech recognition allows a computer to identify the words that a person speaks to a microphone or telephone. The two...

    Provided By National Institute of Technology Kurukshetra

  • White Papers // Jul 2011

    A Semantic Web Engineering Model

    Web Engineering provides the systematic approach to the development of web applications. The Semantic Web is the extension of current Web and further the Semantic Web applications can be considered as the augmentation of web applications with ontological annotations. But, the efficient, reliable and systematic development of semantic web based...

    Provided By National Institute of Technology Kurukshetra