PSG College of Technology

Displaying 1-17 of 17 results

  • White Papers // Nov 2011

    Ontology-Based Emergency Management System in a Social Cloud

    The need for Emergency Management continually grows as the population and exposure to catastrophic failures increase. The ability to offer appropriate services at these emergency situations can be tackled through group communication mechanisms. The entities involved in the group communication include people, organizations, events, locations and essential services. Cloud computing...

    Provided By PSG College of Technology

  • White Papers // Nov 2011

    Statistical Segregation Method to Minimize the False Detections During DDoS Attacks

    DDoS attack aims at occupying the victim resources so as to defy the legitimate requests from reaching it. Even though the attack traffic is generated in intimidating measures, the attack traffic mostly is disguised as the genuine traffic. Hence, most of the mitigation methods cannot segregate the legitimate flows from...

    Provided By PSG College of Technology

  • White Papers // May 2011

    Setting Up of an Open Source Based Private Cloud

    Cloud Computing is an attractive concept in IT field, since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. Cloud services are supported both by proprietary and Open Source...

    Provided By PSG College of Technology

  • White Papers // Jan 2011

    Public Key Cryptosystem Based on Number Theoretic Transforms

    In this paper a Public Key Cryptosystem is proposed using the Number Theoretic Transforms (NTT) over a ring of integer modulo a composite number. The key agreement is similar to ElGamal public key algorithm. The security of the system is based on solution of multivariate linear congruence equations and discrete...

    Provided By PSG College of Technology

  • White Papers // Dec 2010

    Fingerprint Compression Using Multiwavelets

    Large volumes of fingerprints are collected and stored every day in a wide range of applications, including forensics, access control etc. It is evident from the database of Federal Bureau of Investigation (FBI) which contains more than 70 million finger prints. Compression of this database is very important because of...

    Provided By PSG College of Technology

  • White Papers // Oct 2010

    Lightweight C&C Based Botnet Detection Using Aho-Corasick NFA

    Botnet distinguishes itself from the previous malware by having the characteristics of a C&C channel, using which a Botmaster can control the constituents of the botnet. Even though protocols like IRC, HTTP and DNS are exploited to incorporate C&C channels, previous analysis have shown that the majority of the botnets...

    Provided By PSG College of Technology

  • White Papers // Sep 2010

    A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution

    In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every user has the freedom to share any data with other users. The system scalability can be improved by distributing the load...

    Provided By PSG College of Technology

  • White Papers // Aug 2010

    Delay Specific Investigations on QoS Scheduling Schemes for Real-Time Traffic in Packet Switched Networks

    Packet switched data network like Internet, which has traditionally supported throughput sensitive applications such as email and file transfer, is increasingly supporting delay-sensitive multimedia applications such as interactive video. These delay-sensitive applications would often rather sacrifice some throughput for better delay. Unfortunately, the current packet switched network does not offer...

    Provided By PSG College of Technology

  • White Papers // Jun 2010

    Performance Analysis of Broadcasting in Mobile Ad Hoc Networks Using Cluster Approach

    Broadcasting is a fundamental service in Mobile Ad hoc NETworks (MANETs). Cluster based approach are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to reduce the energy consumption and improves the throughput. In this paper, a cluster-based infrastructure is proposed for broadcasting in MANETs....

    Provided By PSG College of Technology

  • White Papers // Apr 2010

    Trust Based Content Distribution for Peer-to-Peer Overlay Networks

    In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, the authors present a trust based content distribution for peer-to-peer overlay...

    Provided By PSG College of Technology

  • White Papers // Mar 2010

    NEWQUE: A New Approach to Active Queue Management for TCP With ECN

    Active Queue Management (AQM) can potentially reduce packet drop rate in the Internet. This is used by routers to control congestion, where packets are dropped before queue become full. In order to improve the performance of congestion routers, a new framework of AQM, namely NEWQUE active queue management algorithm supporting...

    Provided By PSG College of Technology

  • White Papers // Dec 2009

    A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks

    The large scale content distribution systems were improved broadly using the replication techniques. The demanded contents can be brought closer to the clients by multiplying the source of information geographically, which in turn reduce both the access latency and the network traffic. The system scalability can be improved by distributing...

    Provided By PSG College of Technology

  • White Papers // Jul 2009

    Automatic Test Case Generation for UML Object Diagrams Using Genetic Algorithm

    A new model based approach for automated generation of test cases in object oriented systems has been presented. The test cases are derived by analyzing the dynamic behavior of the objects due to internal and external stimuli. The scope of the paper has been limited to the object diagrams taken...

    Provided By PSG College of Technology

  • White Papers // Jul 2009

    Energy Efficient Data Compression in Wireless Sensor Networks

    In order for wireless sensor networks to exploit signal, signal data must be collected at a multitude of sensors and must be shared among the sensors. The vast sharing of data among the sensors contradicts the requirements (energy efficiency, low latency and high accuracy) of wireless networked sensor. This paper...

    Provided By PSG College of Technology

  • White Papers // Jul 2009

    Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400

    New services such as non-interactive video streaming, which demand higher bandwidth have become popular with the introduction of broad band networks. But the quality of streamed video is impaired by the factors such as packet loss, congestion, delay and jitter in the network. Hence, to improve the video quality, an...

    Provided By PSG College of Technology

  • White Papers // Mar 2009

    Design and Implementation of a Novel Peer-to-Peer Information Retrieval Framework

    Peer-to-Peer (P2P) Information Retrieval framework consists of a peer to peer network of nodes, which voluntarily agree to share their resources by joining the network. While joining these nodes construct the active peer list. Each peer maintains a B+ tree containing IP hash values. The files are distributed over the...

    Provided By PSG College of Technology

  • White Papers // Feb 2009

    Performance Analysis of SAFER+ and Triple DES Security Algorithms for Bluetooth Security Systems

    This paper compares SAFER+ encryption algorithm and Triple DES algorithm for Bluetooth security systems is done. Performance of the above security algorithms are evaluated based on the efficiency of the algorithm. The whole design was captured entirely in matlab. In order to check the efficiency of the algorithm, noise is...

    Provided By PSG College of Technology

  • White Papers // Jan 2011

    Public Key Cryptosystem Based on Number Theoretic Transforms

    In this paper a Public Key Cryptosystem is proposed using the Number Theoretic Transforms (NTT) over a ring of integer modulo a composite number. The key agreement is similar to ElGamal public key algorithm. The security of the system is based on solution of multivariate linear congruence equations and discrete...

    Provided By PSG College of Technology

  • White Papers // Nov 2011

    Ontology-Based Emergency Management System in a Social Cloud

    The need for Emergency Management continually grows as the population and exposure to catastrophic failures increase. The ability to offer appropriate services at these emergency situations can be tackled through group communication mechanisms. The entities involved in the group communication include people, organizations, events, locations and essential services. Cloud computing...

    Provided By PSG College of Technology

  • White Papers // Nov 2011

    Statistical Segregation Method to Minimize the False Detections During DDoS Attacks

    DDoS attack aims at occupying the victim resources so as to defy the legitimate requests from reaching it. Even though the attack traffic is generated in intimidating measures, the attack traffic mostly is disguised as the genuine traffic. Hence, most of the mitigation methods cannot segregate the legitimate flows from...

    Provided By PSG College of Technology

  • White Papers // Jul 2009

    Automatic Test Case Generation for UML Object Diagrams Using Genetic Algorithm

    A new model based approach for automated generation of test cases in object oriented systems has been presented. The test cases are derived by analyzing the dynamic behavior of the objects due to internal and external stimuli. The scope of the paper has been limited to the object diagrams taken...

    Provided By PSG College of Technology

  • White Papers // Mar 2009

    Design and Implementation of a Novel Peer-to-Peer Information Retrieval Framework

    Peer-to-Peer (P2P) Information Retrieval framework consists of a peer to peer network of nodes, which voluntarily agree to share their resources by joining the network. While joining these nodes construct the active peer list. Each peer maintains a B+ tree containing IP hash values. The files are distributed over the...

    Provided By PSG College of Technology

  • White Papers // Feb 2009

    Performance Analysis of SAFER+ and Triple DES Security Algorithms for Bluetooth Security Systems

    This paper compares SAFER+ encryption algorithm and Triple DES algorithm for Bluetooth security systems is done. Performance of the above security algorithms are evaluated based on the efficiency of the algorithm. The whole design was captured entirely in matlab. In order to check the efficiency of the algorithm, noise is...

    Provided By PSG College of Technology

  • White Papers // Jul 2009

    Energy Efficient Data Compression in Wireless Sensor Networks

    In order for wireless sensor networks to exploit signal, signal data must be collected at a multitude of sensors and must be shared among the sensors. The vast sharing of data among the sensors contradicts the requirements (energy efficiency, low latency and high accuracy) of wireless networked sensor. This paper...

    Provided By PSG College of Technology

  • White Papers // Mar 2010

    NEWQUE: A New Approach to Active Queue Management for TCP With ECN

    Active Queue Management (AQM) can potentially reduce packet drop rate in the Internet. This is used by routers to control congestion, where packets are dropped before queue become full. In order to improve the performance of congestion routers, a new framework of AQM, namely NEWQUE active queue management algorithm supporting...

    Provided By PSG College of Technology

  • White Papers // Jul 2009

    Implementation of Adaptive Buffer in Video Receivers Using Network Processor IXP 2400

    New services such as non-interactive video streaming, which demand higher bandwidth have become popular with the introduction of broad band networks. But the quality of streamed video is impaired by the factors such as packet loss, congestion, delay and jitter in the network. Hence, to improve the video quality, an...

    Provided By PSG College of Technology

  • White Papers // Apr 2010

    Trust Based Content Distribution for Peer-to-Peer Overlay Networks

    In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, the authors present a trust based content distribution for peer-to-peer overlay...

    Provided By PSG College of Technology

  • White Papers // Oct 2010

    Lightweight C&C Based Botnet Detection Using Aho-Corasick NFA

    Botnet distinguishes itself from the previous malware by having the characteristics of a C&C channel, using which a Botmaster can control the constituents of the botnet. Even though protocols like IRC, HTTP and DNS are exploited to incorporate C&C channels, previous analysis have shown that the majority of the botnets...

    Provided By PSG College of Technology

  • White Papers // Sep 2010

    A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution

    In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every user has the freedom to share any data with other users. The system scalability can be improved by distributing the load...

    Provided By PSG College of Technology

  • White Papers // Jun 2010

    Performance Analysis of Broadcasting in Mobile Ad Hoc Networks Using Cluster Approach

    Broadcasting is a fundamental service in Mobile Ad hoc NETworks (MANETs). Cluster based approach are proposed in literature to reduce the network collision, to reduce delay of packet transmission, to reduce the energy consumption and improves the throughput. In this paper, a cluster-based infrastructure is proposed for broadcasting in MANETs....

    Provided By PSG College of Technology

  • White Papers // Dec 2010

    Fingerprint Compression Using Multiwavelets

    Large volumes of fingerprints are collected and stored every day in a wide range of applications, including forensics, access control etc. It is evident from the database of Federal Bureau of Investigation (FBI) which contains more than 70 million finger prints. Compression of this database is very important because of...

    Provided By PSG College of Technology

  • White Papers // Dec 2009

    A QoS-Aware Intelligent Replica Management Architecture for Content Distribution in Peer-to-Peer Overlay Networks

    The large scale content distribution systems were improved broadly using the replication techniques. The demanded contents can be brought closer to the clients by multiplying the source of information geographically, which in turn reduce both the access latency and the network traffic. The system scalability can be improved by distributing...

    Provided By PSG College of Technology

  • White Papers // May 2011

    Setting Up of an Open Source Based Private Cloud

    Cloud Computing is an attractive concept in IT field, since it allows the resources to be provisioned according to the user needs. It provides services on virtual machines whereby the user can share resources, software and other devices on demand. Cloud services are supported both by proprietary and Open Source...

    Provided By PSG College of Technology

  • White Papers // Aug 2010

    Delay Specific Investigations on QoS Scheduling Schemes for Real-Time Traffic in Packet Switched Networks

    Packet switched data network like Internet, which has traditionally supported throughput sensitive applications such as email and file transfer, is increasingly supporting delay-sensitive multimedia applications such as interactive video. These delay-sensitive applications would often rather sacrifice some throughput for better delay. Unfortunately, the current packet switched network does not offer...

    Provided By PSG College of Technology