Rajiv Gandhi Proudyogiki Vishwavidyalaya

Displaying 1-18 of 18 results

  • White Papers // Jul 2011

    Efficient Model for Attack Verification in 802.11 WLAN Using Filtering Mechanism Based Media Access Control Protocol Fmb-Mac

    The authors have design an attack scenario in which they have declared some nodes as suspicious nodes by their unfair behavior. They may disobey basic rules of Media Access Control protocols while working as a suspicious node by its behavior in 802.11 x WLAN scenarios. Some Throughputs may increase because...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2011

    Survey of Propagation Model in Wireless Network

    To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behavior for MANET is becoming a...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2011

    ECC Over RSA for Asymmetric Encryption: A Review

    Cryptography is used to transmit the data securely in open network. This paper gives the survey of Elliptic Curve Cryptosystem (ECC) used in many applications. ECC is a when compared to RSA and discrete logarithm systems, is a better option for the future. For this reason ECC is such an...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Apr 2011

    Improve Performance of TCP New Reno Over Mobile Ad-Hoc Network Using ABRA

    In a mobile ad hoc network, temporary link failures and route changes occur frequently. With the assumption that all packet losses are due to congestion, TCP performs poorly in such an environment. There are many versions of TCP which modified time to time as per need. In this paper modifications...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Mar 2011

    An Implementation in AODV Based on Active Route Timeout Between Sensor Nodes in Wireless Sensor Networks

    A wireless sensor network is a large scale wireless network of hundreds or even thousands, number of tiny sensor nodes that are capable of sensing, communication, and computation. These networks allow measuring physical parameters such as temperature, pressure, or relative humidity and also allow coordinated signal detection, monitoring, and tracking...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2010

    The Impact of K-Factor on Wireless Link in Indian Semi-desert Terrain

    The wireless links are used widely for point to point line-of-sight communication. The propagation loss on a terrestrial line-of-sight wireless link depends on atmospheric and seasonal conditions. The value of K-factor (effective earth radius) affects the reliability of the link. The value of K-factor where specific data is not available...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2010

    An Overview of Portable Distributed Techniques

    In this paper, the authors reviewed of several portable parallel programming paradigms for use in a distributed programming environment. The Techniques reviewed here are portable. These are mainly distributing computing using MPI pure java based, MPI native java based (JNI) and PVM. They will discuss architecture and utilities of each...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Jan 2010

    Color Image Clustering Using Block Truncation Algorithm

    With the advancement in image capturing device, the image data been generated at high volume. If images are analyzed properly, they can reveal useful information to the human users. Content based image retrieval address the problem of retrieving images relevant to the user needs from image databases on the basis...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Jan 2010

    Significant Interval and Frequent Pattern Discovery in Web Log Data

    There is a considerable body of work on sequence mining of Web Log Data. The authors are using One Pass Frequent Episode Discovery (or FED) algorithm, takes a different approach than the traditional apriori class of pattern detection algorithms. In this approach significant intervals for each Website are computed first...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Effect of Pause Time on DSR, AODV and DYMO Routing Protocols in MANET

    A Mobile ad hoc network is a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. The mobile nodes perform both as a host and a router forwarding packets to other nodes. Routing in these...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Simulation Analysis of STAR, DSR and ZRP in Presence of Misbehaving Nodes in MANET

    Wireless mobile ad-hoc networks are those networks which has no physical links between the nodes. Due to the mobility of nodes, interference, multipath propagation and path loss there is no fixed topology in this network. Hence, some routing protocol is needed to function properly for these networks. Many Routing protocols...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Performance and Analysis of CSMA, MACA & ALOHA to Support Quality of Services (QoSs) Under Varying Conditions of No. of Nodes in Ad Hoc Wireless Networks

    Ad hoc Wireless Network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and to some extent guaranteed in advance in...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Design of Intelligent Layer for Flexible Querying in Databases

    Computer-based information technologies have been extensively used to help many organizations, private companies, and academic and education institutions manage their processes and information systems hereby become their nervous centre. The explosion of massive data sets created by businesses, science and governments necessitates intelligent and more powerful computing paradigms so that...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Survey of Clustering Algorithms for MANET

    Many clustering schemes have been proposed for ad hoc networks. A systematic classification of these clustering schemes enables one to better understand and make improvements. In mobile ad hoc networks, the movement of the network nodes may quickly change the topology resulting in the increase of the overhead message in...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    An Ensemble Approach for Feature Selection of Cyber Attack Dataset

    Feature selection is an indispensable pre-processing step when mining huge datasets that can significantly improve the overall system performance. Therefore in this paper the authors focus on a hybrid approach of feature selection. This method falls into two phases. The filter phase select the features with highest information gain and...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Nov 2009

    Generalized Discriminant Analysis Algorithm for Feature Reduction in Cyber Attack Detection System

    This Generalized Discriminant Analysis (GDA) has provided an extremely powerful approach to extracting non-linear features. The network traffic data provided for the design of intrusion detection system always are large with ineffective information, thus the authors need to remove the worthless information from the original high dimensional database. To improve...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Aug 2009

    Adaptive Routing for Wireless Sensor Networks

    An important issue in wireless sensor network is how to send information in an efficient and adaptive way. An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad-hoc network. In ad hoc networks,...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2009

    Designing and Analysis Issues for an Attack Resilient and Adaptive Medium Access Control Protocol for Computer Networks: An Exclusive Survey

    Now a days the authors are trying to improve through put and efficiency of existing MAC protocols used, suffering from different problem like Request to send and clear to send message propagation, and channel chapter effect or Unfairness due to using Binary Exponential Backoff algorithm, effect of noise in communication...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Aug 2009

    Adaptive Routing for Wireless Sensor Networks

    An important issue in wireless sensor network is how to send information in an efficient and adaptive way. An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad-hoc network. In ad hoc networks,...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2010

    The Impact of K-Factor on Wireless Link in Indian Semi-desert Terrain

    The wireless links are used widely for point to point line-of-sight communication. The propagation loss on a terrestrial line-of-sight wireless link depends on atmospheric and seasonal conditions. The value of K-factor (effective earth radius) affects the reliability of the link. The value of K-factor where specific data is not available...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2009

    Designing and Analysis Issues for an Attack Resilient and Adaptive Medium Access Control Protocol for Computer Networks: An Exclusive Survey

    Now a days the authors are trying to improve through put and efficiency of existing MAC protocols used, suffering from different problem like Request to send and clear to send message propagation, and channel chapter effect or Unfairness due to using Binary Exponential Backoff algorithm, effect of noise in communication...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Apr 2011

    Improve Performance of TCP New Reno Over Mobile Ad-Hoc Network Using ABRA

    In a mobile ad hoc network, temporary link failures and route changes occur frequently. With the assumption that all packet losses are due to congestion, TCP performs poorly in such an environment. There are many versions of TCP which modified time to time as per need. In this paper modifications...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Nov 2009

    Generalized Discriminant Analysis Algorithm for Feature Reduction in Cyber Attack Detection System

    This Generalized Discriminant Analysis (GDA) has provided an extremely powerful approach to extracting non-linear features. The network traffic data provided for the design of intrusion detection system always are large with ineffective information, thus the authors need to remove the worthless information from the original high dimensional database. To improve...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    An Ensemble Approach for Feature Selection of Cyber Attack Dataset

    Feature selection is an indispensable pre-processing step when mining huge datasets that can significantly improve the overall system performance. Therefore in this paper the authors focus on a hybrid approach of feature selection. This method falls into two phases. The filter phase select the features with highest information gain and...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Jan 2010

    Color Image Clustering Using Block Truncation Algorithm

    With the advancement in image capturing device, the image data been generated at high volume. If images are analyzed properly, they can reveal useful information to the human users. Content based image retrieval address the problem of retrieving images relevant to the user needs from image databases on the basis...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Jan 2010

    Significant Interval and Frequent Pattern Discovery in Web Log Data

    There is a considerable body of work on sequence mining of Web Log Data. The authors are using One Pass Frequent Episode Discovery (or FED) algorithm, takes a different approach than the traditional apriori class of pattern detection algorithms. In this approach significant intervals for each Website are computed first...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2010

    An Overview of Portable Distributed Techniques

    In this paper, the authors reviewed of several portable parallel programming paradigms for use in a distributed programming environment. The Techniques reviewed here are portable. These are mainly distributing computing using MPI pure java based, MPI native java based (JNI) and PVM. They will discuss architecture and utilities of each...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Design of Intelligent Layer for Flexible Querying in Databases

    Computer-based information technologies have been extensively used to help many organizations, private companies, and academic and education institutions manage their processes and information systems hereby become their nervous centre. The explosion of massive data sets created by businesses, science and governments necessitates intelligent and more powerful computing paradigms so that...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Survey of Clustering Algorithms for MANET

    Many clustering schemes have been proposed for ad hoc networks. A systematic classification of these clustering schemes enables one to better understand and make improvements. In mobile ad hoc networks, the movement of the network nodes may quickly change the topology resulting in the increase of the overhead message in...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2011

    Survey of Propagation Model in Wireless Network

    To implementation of mobile ad hoc network wave propagation models are necessary to determine propagation characteristic through a medium. Wireless mobile ad hoc networks are self creating and self organizing entity. Propagation study provides an estimation of signal characteristics. Accurate prediction of radio propagation behavior for MANET is becoming a...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // May 2011

    ECC Over RSA for Asymmetric Encryption: A Review

    Cryptography is used to transmit the data securely in open network. This paper gives the survey of Elliptic Curve Cryptosystem (ECC) used in many applications. ECC is a when compared to RSA and discrete logarithm systems, is a better option for the future. For this reason ECC is such an...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Mar 2011

    An Implementation in AODV Based on Active Route Timeout Between Sensor Nodes in Wireless Sensor Networks

    A wireless sensor network is a large scale wireless network of hundreds or even thousands, number of tiny sensor nodes that are capable of sensing, communication, and computation. These networks allow measuring physical parameters such as temperature, pressure, or relative humidity and also allow coordinated signal detection, monitoring, and tracking...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Performance and Analysis of CSMA, MACA & ALOHA to Support Quality of Services (QoSs) Under Varying Conditions of No. of Nodes in Ad Hoc Wireless Networks

    Ad hoc Wireless Network (AWN) is a collection of mobile hosts forming a temporary network on the fly, without using any fixed infrastructure. QoS (Quality of Service) is the idea that transmission rates, error rates, and other characteristics can be measured, improved, and to some extent guaranteed in advance in...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Effect of Pause Time on DSR, AODV and DYMO Routing Protocols in MANET

    A Mobile ad hoc network is a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure or any centralized administration. The mobile nodes perform both as a host and a router forwarding packets to other nodes. Routing in these...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Dec 2009

    Simulation Analysis of STAR, DSR and ZRP in Presence of Misbehaving Nodes in MANET

    Wireless mobile ad-hoc networks are those networks which has no physical links between the nodes. Due to the mobility of nodes, interference, multipath propagation and path loss there is no fixed topology in this network. Hence, some routing protocol is needed to function properly for these networks. Many Routing protocols...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya

  • White Papers // Jul 2011

    Efficient Model for Attack Verification in 802.11 WLAN Using Filtering Mechanism Based Media Access Control Protocol Fmb-Mac

    The authors have design an attack scenario in which they have declared some nodes as suspicious nodes by their unfair behavior. They may disobey basic rules of Media Access Control protocols while working as a suspicious node by its behavior in 802.11 x WLAN scenarios. Some Throughputs may increase because...

    Provided By Rajiv Gandhi Proudyogiki Vishwavidyalaya