RIMT - Institute of Engineering & Technology

Displaying 1-17 of 17 results

  • White Papers // Mar 2010

    Wireless Computing Networks

    Mobile computing has fast become an important new paradigm in today's world of networked computing systems. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDAs to wireless sensor networks, mobile computing has become ubiquitous in its impact on their daily lives. The debut if iPhones and the proliferation of...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Best Activities in Software Test Automation

    This paper gives an introduction to Software testing. Then, the authors discussed various best activities for test automation. Automating the execution of tests is becoming more and more popular as the need to improve software quality amidst increasing system complexity becomes ever stronger. The appeal of having the computer run...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Wireless Technologies in E-Business: A Survey

    Developments in new mobile devices and services have raised the interest of corporations to implement wireless applications in their own businesses. Various new technologies are broadening the possibilities for corporations to deploy new applications which also raise the requirements for the manageability. As companies implement new wireless services and applications...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Analysis of Substitution and Permutation From Cryptanalysis Perspective

    Cryptography, which is considered as a science of present century is actually an ancient technique. Since early civilizations, different methods have been developed to send secret messages. But with advent of Internet, data privacy face more risks, thus need of information security increases which leads to the new developments of...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    A Comparative Study of Routing Protocols in VANET

    Vehicular Ad Hoc NETworks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguish approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary issue for smart ITS. The paper discusses the advantages and disadvantages of these routing protocols, it...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Analysis of a Reliable Handoff Procedure for IEEE 802.16e Based Networks

    IEEE 802.16 is protocol for fixed broadband wireless access that is currently trying to add mobility among the mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "Handoff" (change of connection between two base stations "BS" by...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Analysis of Access Control Protocols i.e. EAP, RADIUS and DIAMETER of WiMAX Security

    Wi-MAX technology (IEEE 802.16) is the latest technology promised to provide Broadband Wireless Access (BWA) over a long range. Meanwhile its security is becoming critical issue with the rapid multiplication of wireless threats. As far as security of Wi-MAX is concerned first priority is across wireless network and other is...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Minimizing Power Consumption in Mobile Usage

    The main purpose of the project is to minimize the power consumption. Power efficiency is necessary to lengthen the battery lifetime in the portable systems, as well as to reduce the operational costs and the environmental impact of stationary systems. This paper examines a new technique to enable power savings...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Analysis of Point Multiplication Methods for Elliptic Curve Cryptography

    Elliptic curve based cryptosystem is an efficient public key cryptosystem, which is more suitable for limited environments. The performance of elliptic curve cryptosystem heavily depends on an operation called point multiplication. The paper gives an introduction to Elliptic Curve Cryptography (ECC). The paper presents the comparative study of methods for...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Characteristic Analysis of VOIP Traffic for Wireless Network

    A traditional Voice over Internet Protocol (VoIP) technique is based on client/server architecture. In this paper, the authors present VoIP architecture for Ad-hoc network based on H.323 Standard that provides users to communicate with each other. Their work is divided into two parts: one to demonstrate a simple VOIP scenario...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Security Aspects in Ad Hoc Network Routing

    The authors have presented here some security aspects related to the routing protocols for Mobile Ad hoc NETworks (MANETs). A mobile ad-hoc network is a self-configuring network of mobile routers, connected by wireless links, which are free to move randomly and organize themselves arbitrarily. These types of networks operate in...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Improvement in Signature Detection Engine Using Dual Algorithms

    This paper talks about a novel idea of dual algorithms in Signature Detection Engines, which can be thought of as anti-virus scanners for network traffic. Signature Detection Engine inspects the incoming packets for the known intrusion-related signatures or anomalies related to Internet protocols. Based upon a set of signatures and...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Aspect Oriented Distributed System Using AspectJ

    This paper discusses the impact of Aspect Oriented Programming (AOP) on Java-based communication middleware (Java RMI) system and need to introduce aspects in Java RMI systems. There are certain properties like tracing, exception handling, distribution and profiling in Java RMI system which they cannot encapsulate properly using object oriented programming...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Efficient Software Cost Estimation Using Neuro-Fuzzy Technique

    Software estimation accuracy is among the greatest challenges for software developers. As Neuro-fuzzy based system is able to approximate the non-linear function with more precision so it is used as a soft computing approach to generate model by formulating the relationship based on its training. The approach presented in this...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    QoS Issues of Media Access Delay and Throughput in WLAN

    To analyze the performance of various MAC protocols in providing QoS to users of WLAN, the metrics used were Throughput, Data Drop, Retransmission and Medium Access Delay. During the evaluation of EDCF, the performance of various access categories was the determining factor. Two scenarios, with same Physical and MAC parameters,...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Prospects of E-Commerce in India

    E-Commerce has unleashed yet another revolution, which is changing the way businesses buy and sell products and services. E-commerce stands for electronic commerce and pertains to trading in goods and services through the electronic medium. India is showing tremendous growth in the E-commerce. The low cost of the PC and...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Network Security - A Layered Approach

    Security issues are critical for the success of pervasive computing. Because pervasive computing and e-business may provide millions of people with the power to move trillions of dollars in goods or money by a few mouse clicks, the security of e-business transaction is a top priority. With the number of...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Characteristic Analysis of VOIP Traffic for Wireless Network

    A traditional Voice over Internet Protocol (VoIP) technique is based on client/server architecture. In this paper, the authors present VoIP architecture for Ad-hoc network based on H.323 Standard that provides users to communicate with each other. Their work is divided into two parts: one to demonstrate a simple VOIP scenario...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Security Aspects in Ad Hoc Network Routing

    The authors have presented here some security aspects related to the routing protocols for Mobile Ad hoc NETworks (MANETs). A mobile ad-hoc network is a self-configuring network of mobile routers, connected by wireless links, which are free to move randomly and organize themselves arbitrarily. These types of networks operate in...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Improvement in Signature Detection Engine Using Dual Algorithms

    This paper talks about a novel idea of dual algorithms in Signature Detection Engines, which can be thought of as anti-virus scanners for network traffic. Signature Detection Engine inspects the incoming packets for the known intrusion-related signatures or anomalies related to Internet protocols. Based upon a set of signatures and...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Analysis of a Reliable Handoff Procedure for IEEE 802.16e Based Networks

    IEEE 802.16 is protocol for fixed broadband wireless access that is currently trying to add mobility among the mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "Handoff" (change of connection between two base stations "BS" by...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Analysis of Access Control Protocols i.e. EAP, RADIUS and DIAMETER of WiMAX Security

    Wi-MAX technology (IEEE 802.16) is the latest technology promised to provide Broadband Wireless Access (BWA) over a long range. Meanwhile its security is becoming critical issue with the rapid multiplication of wireless threats. As far as security of Wi-MAX is concerned first priority is across wireless network and other is...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Minimizing Power Consumption in Mobile Usage

    The main purpose of the project is to minimize the power consumption. Power efficiency is necessary to lengthen the battery lifetime in the portable systems, as well as to reduce the operational costs and the environmental impact of stationary systems. This paper examines a new technique to enable power savings...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Aspect Oriented Distributed System Using AspectJ

    This paper discusses the impact of Aspect Oriented Programming (AOP) on Java-based communication middleware (Java RMI) system and need to introduce aspects in Java RMI systems. There are certain properties like tracing, exception handling, distribution and profiling in Java RMI system which they cannot encapsulate properly using object oriented programming...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Best Activities in Software Test Automation

    This paper gives an introduction to Software testing. Then, the authors discussed various best activities for test automation. Automating the execution of tests is becoming more and more popular as the need to improve software quality amidst increasing system complexity becomes ever stronger. The appeal of having the computer run...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Efficient Software Cost Estimation Using Neuro-Fuzzy Technique

    Software estimation accuracy is among the greatest challenges for software developers. As Neuro-fuzzy based system is able to approximate the non-linear function with more precision so it is used as a soft computing approach to generate model by formulating the relationship based on its training. The approach presented in this...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Performance Analysis of Point Multiplication Methods for Elliptic Curve Cryptography

    Elliptic curve based cryptosystem is an efficient public key cryptosystem, which is more suitable for limited environments. The performance of elliptic curve cryptosystem heavily depends on an operation called point multiplication. The paper gives an introduction to Elliptic Curve Cryptography (ECC). The paper presents the comparative study of methods for...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Wireless Technologies in E-Business: A Survey

    Developments in new mobile devices and services have raised the interest of corporations to implement wireless applications in their own businesses. Various new technologies are broadening the possibilities for corporations to deploy new applications which also raise the requirements for the manageability. As companies implement new wireless services and applications...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Analysis of Substitution and Permutation From Cryptanalysis Perspective

    Cryptography, which is considered as a science of present century is actually an ancient technique. Since early civilizations, different methods have been developed to send secret messages. But with advent of Internet, data privacy face more risks, thus need of information security increases which leads to the new developments of...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Wireless Computing Networks

    Mobile computing has fast become an important new paradigm in today's world of networked computing systems. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDAs to wireless sensor networks, mobile computing has become ubiquitous in its impact on their daily lives. The debut if iPhones and the proliferation of...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    A Comparative Study of Routing Protocols in VANET

    Vehicular Ad Hoc NETworks (VANET) is a subclass of Mobile ad hoc networks which provides a distinguish approach for Intelligent Transport System (ITS). The survey of routing protocols in VANET is important and necessary issue for smart ITS. The paper discusses the advantages and disadvantages of these routing protocols, it...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    QoS Issues of Media Access Delay and Throughput in WLAN

    To analyze the performance of various MAC protocols in providing QoS to users of WLAN, the metrics used were Throughput, Data Drop, Retransmission and Medium Access Delay. During the evaluation of EDCF, the performance of various access categories was the determining factor. Two scenarios, with same Physical and MAC parameters,...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Prospects of E-Commerce in India

    E-Commerce has unleashed yet another revolution, which is changing the way businesses buy and sell products and services. E-commerce stands for electronic commerce and pertains to trading in goods and services through the electronic medium. India is showing tremendous growth in the E-commerce. The low cost of the PC and...

    Provided By RIMT - Institute of Engineering & Technology

  • White Papers // Mar 2010

    Network Security - A Layered Approach

    Security issues are critical for the success of pervasive computing. Because pervasive computing and e-business may provide millions of people with the power to move trillions of dollars in goods or money by a few mouse clicks, the security of e-business transaction is a top priority. With the number of...

    Provided By RIMT - Institute of Engineering & Technology