Singhania University

Displaying 1-23 of 23 results

  • White Papers // Feb 2012

    Comparison of Conditional Internal Activity Techniques for Low Power Consumption and High Performance Flip-Flops

    This paper reviews the three Conditional internal activity Techniques for high performance flip-flops namely Conditional Capture, Conditional Pre-charge and Conditional Discharge techniques. These techniques are reviewed in terms of power and delay and classified based on how to prevent or reduce the internal switching activity. Application of the Conditional techniques...

    Provided By Singhania University

  • White Papers // Dec 2011

    E-Governance: A Successful Implementation of Government Policies Using Cloud Computing

    In the recent years, there has been rapid growth in E-governance. The information and communication technology is the strength of character for majority of businesses today, E-Governance has become a vital scheme for companies in procuring quality of services from an experienced service provider. E-governance being one of the important...

    Provided By Singhania University

  • White Papers // Oct 2011

    Minimum Process Coordinated Checkpointing Scheme for Ad Hoc Networks

    The Wireless Mobile Ad hoc NETwork (MANET) architecture is one consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. This has made possible creating a mobile distributed computing environment and has also brought several new challenges in distributed protocol design....

    Provided By Singhania University

  • White Papers // Aug 2011

    Analysis of Recent Checkpointing Techniques for Mobile Computing Systems

    Recovery from transient failures is one of the prime issues in the context of distributed systems. These systems demand to have transparent yet efficient techniques to achieve the same. Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the...

    Provided By Singhania University

  • White Papers // Jul 2011

    Study on Mobile Adhoc Network Routing Protocols

    Many wireless communication techniques are commercially available, such as the Wireless LAN, Bluetooth, GSM, GPRS, and CDMA. Because an all-IP network will be a trend, access to the Internet via wireless communication devices has become an important issue. Mobile Internet protocol is an extension to Internet Protocol proposed by the...

    Provided By Singhania University

  • White Papers // Jul 2011

    Attacks on Wireless MANET

    Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the combined Internet-MANET environment also, security is an important issue keeping in view the Internet connectivity...

    Provided By Singhania University

  • White Papers // Jul 2011

    Security Issues in Wireless Sensor Network

    Wireless Sensor and Actor Networks (WSANs) refer to a group of sensors and actors linked by wireless medium to perform distributed sensing and actuation tasks. Nowadays it is rapidly growing in popularity and becoming a part of the use. It is giving the vision of anywhere and anytime with pervasive...

    Provided By Singhania University

  • White Papers // Jun 2011

    Adaptive Scalable Cross Layer Framework for Multi-Hop Wireless Sensor Networks

    The role of the sensor network from simply a means for communication to a technology that can be engineered to improve structural assessment through the interaction of sub-networks fusing data from distributed, heterogeneous sensor arrays. The multi-scale network concept introduced here helps to improve power efficiency, minimize packet loss, latency...

    Provided By Singhania University

  • White Papers // May 2011

    Message Induced Soft Chekpointing for Recovery in Mobile Environments

    Checkpointing is one of the commonly used techniques to provide fault tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence...

    Provided By Singhania University

  • White Papers // May 2011

    Android in Opposition to iPhone

    The paper is an analysis and comparison of the android mobile OS with the iPhone which have ruled the mobile market in past years today is facing a downfall just because of the introduction of this new OS. Android with its new and extraordinary features is being loved by all...

    Provided By Singhania University

  • White Papers // May 2011

    Survey of Latest Wireless Cellular Technologies for Enhancement of Spectral Density at Reduced Cost

    Mobile devices together with the intelligence that will be embedded in human environments - home, office, public places - will create a new platform that enables ubiquitous sensing, computing, storage and communication. Core requirements for this kind of ubiquitous ambient intelligence are that the devices are autonomous and robust. They...

    Provided By Singhania University

  • White Papers // May 2011

    An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network

    Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. In a WMN, it is possible to reach an IGW or any Mesh Router (MR) through multiple...

    Provided By Singhania University

  • White Papers // May 2011

    Key Scheduling Scheme for Secured Routing in Wireless Adhoc Network

    A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for...

    Provided By Singhania University

  • White Papers // Apr 2011

    Adaptive Resource Allocation for MAI Minimization in Wireless Adhoc Network

    Coding-based solutions for MANETs have emerged as a basic solution to current high rate data accessing in ad-hoc network. This has become essential related to the absence of centralized control such as a monitoring station. A code assignment protocol is needed to assign distinct codes to different terminals. This problem...

    Provided By Singhania University

  • White Papers // Jan 2011

    Cloud Computing - The Next Generation Computing

    In the era of technology, information technology becomes an essential part of an organization. Every organization has to invest a huge amount in the establishment of IT infrastructure (Hardware, Business Applications, Data Centers, office space, etc.) and for the team of technical experts to maintain it. Once, one of the...

    Provided By Singhania University

  • White Papers // Dec 2010

    A Key Agreement Protocol Using Non-Abelian Group

    The Key exchange problems are of central interest in security world. The basic aim is that two people who can only communicate via an insecure channel want to find a common secret key without any attack. In this paper, the authors elaborated the process for well secured and assured for...

    Provided By Singhania University

  • White Papers // Nov 2010

    Robust Energy Management Routing in WSN Using Neural Networks

    Wireless Sensor Networks (WSNs) deployment process requires a continuous resource of energy. In this way, it become more important to monitor continuously the consumption of energy, trace where it is most required and utilized, and make a policy for uniform energy distribution at each node and energy efficient routing in...

    Provided By Singhania University

  • White Papers // Nov 2010

    A Knowledge Management Model to Improve Information Security

    Information security is an important issue in today's world. Information security management can no more be done by merely a set of hardware and software, rather, it requires a complete end-to-end system. Such a system is called Information Security Management System. The authors have proposed a model to improve information...

    Provided By Singhania University

  • White Papers // Nov 2010

    Role of Knowledge Management in Enhancing Information Security

    User's knowledge of information security is one of the important factor in information security management as 70-80% security incidents occurred due to negligence or unawareness of users. In this paper the authors have analyzed the utility of knowledge management tools to rapidly capture, store, share and disseminate the information security...

    Provided By Singhania University

  • White Papers // Oct 2010

    A New Optimistic Mobility Model for Mobile Ad Hoc Networks

    To produce a real-world environment within which an ad hoc network can be formed among a set of nodes, there is a need for the development of realistic, generic and comprehensive mobility models. Simulation environment is an important tool for the evaluation of new concepts in networking. Here, the authors...

    Provided By Singhania University

  • White Papers // Sep 2010

    Mapping Cloud Computing Onto Useful e-Governance

    Most of the services viewed in context to grid and cloud computing are mostly confined to services that are available for intellectual purposes. The grid or cloud computing are large scale distributed systems. The essence of large scale distribution can only be realized if the services are rendered to common...

    Provided By Singhania University

  • White Papers // May 2010

    Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems

    Minimum-process coordinated checkpointing is a suitable approach to introduce fault tolerance in mobile distributed systems transparently. It may require blocking of processes, extra synchronization messages or taking some useless checkpoints. All process checkpointing may lead to exceedingly high checkpointing overhead. To optimize both matrices, the checkpointing overhead and the loss...

    Provided By Singhania University

  • White Papers // May 2010

    A Nonblocking Coordinated Checkpointing Algorithm for Mobile Computing Systems

    A checkpoint algorithm for mobile computing systems needs to handle many new issues like: mobility, low bandwidth of wireless channels, and lack of stable storage on mobile nodes, disconnections, limited battery power and high failure rate of mobile nodes. These issues make traditional checkpointing techniques unsuitable for such environments. Minimum-process...

    Provided By Singhania University

  • White Papers // May 2010

    Soft-Checkpointing Based Coordinated Checkpointing Protocol for Mobile Distributed Systems

    Minimum-process coordinated checkpointing is a suitable approach to introduce fault tolerance in mobile distributed systems transparently. It may require blocking of processes, extra synchronization messages or taking some useless checkpoints. All process checkpointing may lead to exceedingly high checkpointing overhead. To optimize both matrices, the checkpointing overhead and the loss...

    Provided By Singhania University

  • White Papers // Jul 2011

    Study on Mobile Adhoc Network Routing Protocols

    Many wireless communication techniques are commercially available, such as the Wireless LAN, Bluetooth, GSM, GPRS, and CDMA. Because an all-IP network will be a trend, access to the Internet via wireless communication devices has become an important issue. Mobile Internet protocol is an extension to Internet Protocol proposed by the...

    Provided By Singhania University

  • White Papers // Jul 2011

    Attacks on Wireless MANET

    Security has always been a key issue with wireless networks since there are no physical boundaries. Experience has shown numerous vulnerabilities to a variety of attacks even when security measures are in place. In the combined Internet-MANET environment also, security is an important issue keeping in view the Internet connectivity...

    Provided By Singhania University

  • White Papers // Aug 2011

    Analysis of Recent Checkpointing Techniques for Mobile Computing Systems

    Recovery from transient failures is one of the prime issues in the context of distributed systems. These systems demand to have transparent yet efficient techniques to achieve the same. Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the...

    Provided By Singhania University

  • White Papers // Apr 2011

    Adaptive Resource Allocation for MAI Minimization in Wireless Adhoc Network

    Coding-based solutions for MANETs have emerged as a basic solution to current high rate data accessing in ad-hoc network. This has become essential related to the absence of centralized control such as a monitoring station. A code assignment protocol is needed to assign distinct codes to different terminals. This problem...

    Provided By Singhania University

  • White Papers // Oct 2011

    Minimum Process Coordinated Checkpointing Scheme for Ad Hoc Networks

    The Wireless Mobile Ad hoc NETwork (MANET) architecture is one consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. This has made possible creating a mobile distributed computing environment and has also brought several new challenges in distributed protocol design....

    Provided By Singhania University

  • White Papers // Feb 2012

    Comparison of Conditional Internal Activity Techniques for Low Power Consumption and High Performance Flip-Flops

    This paper reviews the three Conditional internal activity Techniques for high performance flip-flops namely Conditional Capture, Conditional Pre-charge and Conditional Discharge techniques. These techniques are reviewed in terms of power and delay and classified based on how to prevent or reduce the internal switching activity. Application of the Conditional techniques...

    Provided By Singhania University

  • White Papers // Dec 2011

    E-Governance: A Successful Implementation of Government Policies Using Cloud Computing

    In the recent years, there has been rapid growth in E-governance. The information and communication technology is the strength of character for majority of businesses today, E-Governance has become a vital scheme for companies in procuring quality of services from an experienced service provider. E-governance being one of the important...

    Provided By Singhania University

  • White Papers // May 2011

    Survey of Latest Wireless Cellular Technologies for Enhancement of Spectral Density at Reduced Cost

    Mobile devices together with the intelligence that will be embedded in human environments - home, office, public places - will create a new platform that enables ubiquitous sensing, computing, storage and communication. Core requirements for this kind of ubiquitous ambient intelligence are that the devices are autonomous and robust. They...

    Provided By Singhania University

  • White Papers // May 2011

    An Improved Hop-Count Metric for Infrastructural Wireless Mesh Network

    Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. In a WMN, it is possible to reach an IGW or any Mesh Router (MR) through multiple...

    Provided By Singhania University

  • White Papers // May 2011

    Message Induced Soft Chekpointing for Recovery in Mobile Environments

    Checkpointing is one of the commonly used techniques to provide fault tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence...

    Provided By Singhania University

  • White Papers // May 2011

    Android in Opposition to iPhone

    The paper is an analysis and comparison of the android mobile OS with the iPhone which have ruled the mobile market in past years today is facing a downfall just because of the introduction of this new OS. Android with its new and extraordinary features is being loved by all...

    Provided By Singhania University

  • White Papers // Jan 2011

    Cloud Computing - The Next Generation Computing

    In the era of technology, information technology becomes an essential part of an organization. Every organization has to invest a huge amount in the establishment of IT infrastructure (Hardware, Business Applications, Data Centers, office space, etc.) and for the team of technical experts to maintain it. Once, one of the...

    Provided By Singhania University

  • White Papers // Jul 2011

    Security Issues in Wireless Sensor Network

    Wireless Sensor and Actor Networks (WSANs) refer to a group of sensors and actors linked by wireless medium to perform distributed sensing and actuation tasks. Nowadays it is rapidly growing in popularity and becoming a part of the use. It is giving the vision of anywhere and anytime with pervasive...

    Provided By Singhania University

  • White Papers // Jun 2011

    Adaptive Scalable Cross Layer Framework for Multi-Hop Wireless Sensor Networks

    The role of the sensor network from simply a means for communication to a technology that can be engineered to improve structural assessment through the interaction of sub-networks fusing data from distributed, heterogeneous sensor arrays. The multi-scale network concept introduced here helps to improve power efficiency, minimize packet loss, latency...

    Provided By Singhania University

  • White Papers // May 2011

    Key Scheduling Scheme for Secured Routing in Wireless Adhoc Network

    A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for...

    Provided By Singhania University

  • White Papers // Sep 2010

    Mapping Cloud Computing Onto Useful e-Governance

    Most of the services viewed in context to grid and cloud computing are mostly confined to services that are available for intellectual purposes. The grid or cloud computing are large scale distributed systems. The essence of large scale distribution can only be realized if the services are rendered to common...

    Provided By Singhania University

  • White Papers // May 2010

    A Nonblocking Coordinated Checkpointing Algorithm for Mobile Computing Systems

    A checkpoint algorithm for mobile computing systems needs to handle many new issues like: mobility, low bandwidth of wireless channels, and lack of stable storage on mobile nodes, disconnections, limited battery power and high failure rate of mobile nodes. These issues make traditional checkpointing techniques unsuitable for such environments. Minimum-process...

    Provided By Singhania University

  • White Papers // Oct 2010

    A New Optimistic Mobility Model for Mobile Ad Hoc Networks

    To produce a real-world environment within which an ad hoc network can be formed among a set of nodes, there is a need for the development of realistic, generic and comprehensive mobility models. Simulation environment is an important tool for the evaluation of new concepts in networking. Here, the authors...

    Provided By Singhania University

  • White Papers // Nov 2010

    Robust Energy Management Routing in WSN Using Neural Networks

    Wireless Sensor Networks (WSNs) deployment process requires a continuous resource of energy. In this way, it become more important to monitor continuously the consumption of energy, trace where it is most required and utilized, and make a policy for uniform energy distribution at each node and energy efficient routing in...

    Provided By Singhania University

  • White Papers // Dec 2010

    A Key Agreement Protocol Using Non-Abelian Group

    The Key exchange problems are of central interest in security world. The basic aim is that two people who can only communicate via an insecure channel want to find a common secret key without any attack. In this paper, the authors elaborated the process for well secured and assured for...

    Provided By Singhania University

  • White Papers // Nov 2010

    A Knowledge Management Model to Improve Information Security

    Information security is an important issue in today's world. Information security management can no more be done by merely a set of hardware and software, rather, it requires a complete end-to-end system. Such a system is called Information Security Management System. The authors have proposed a model to improve information...

    Provided By Singhania University

  • White Papers // Nov 2010

    Role of Knowledge Management in Enhancing Information Security

    User's knowledge of information security is one of the important factor in information security management as 70-80% security incidents occurred due to negligence or unawareness of users. In this paper the authors have analyzed the utility of knowledge management tools to rapidly capture, store, share and disseminate the information security...

    Provided By Singhania University