Sri Krishnadevaraya University

Displaying 1-8 of 8 results

  • White Papers // Sep 2011

    Credit Card Fraud Detection Analysis

    Computer security and certain aspects of cyber crime is being increasing day by day. The detailed study of the present day most commonly encountered cyber crime like Credit card fraud analysis is presented in this paper. The model reported in this paper is based on Hidden Markov Model(HMM), is a...

    Provided By Sri Krishnadevaraya University

  • White Papers // Apr 2011

    Disseminated Public-Key Management and Certificate Generation Scheme for MANET

    In this paper, the authors first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then they discuss the basic operations of their public-key management scheme: creation of public (and private) keys, issuing...

    Provided By Sri Krishnadevaraya University

  • White Papers // Jan 2011

    Survey of Cluster Based Routing Protocols in Mobile Ad Hoc Networks

    Clustering in Mobile Ad Hoc NETworks (MANETs) has many advantages compared to the traditional networks. But the highly dynamic and unstable nature of MANETs makes it difficult for the cluster based routing protocols to divide a mobile network into clusters and determination of cluster heads for each cluster. In this...

    Provided By Sri Krishnadevaraya University

  • White Papers // Aug 2010

    Decentralized Handoff for Microcellular Mobile Communication System Using Fuzzy Logic

    Efficient handoff algorithms are a cost-effective way of enhancing the capacity and QoS of cellular system. The higher value of hysteresis effectively prevents unnecessary handoffs but causes undesired cell dragging. This undesired cell dragging causes interference or could lead to dropped calls in microcellular environment. The problems are further exacerbated...

    Provided By Sri Krishnadevaraya University

  • White Papers // Apr 2010

    Comparisons of SAODV and TAODV, DSR Mobile Ad Hoc Network Routing Protocols

    In traditional wireless networks, a base station or access point facilitate communications between nodes within the network and communications with destinations outside the network. In contrast, MANETs forms a network in the absence of fixed infrastructures. The requirement of these networks is only nodes that can interact with radio hardware...

    Provided By Sri Krishnadevaraya University

  • White Papers // Jan 2010

    Reliability in MANET's Using Enhanced Double Coverage Broadcasting (EDCB)

    The broadcast operation, as a fundamental service in Mobile Adhoc NETworks (MANETs), is prone to the broadcast storm problem if forwarding nodes are not carefully designated. The objective of reducing broadcast redundancy, while providing high delivery ratio under high transmission error rate is a major challenge in MANETs. This paper...

    Provided By Sri Krishnadevaraya University

  • White Papers // Dec 2009

    A Stable Adaptive Optimization for DSR Protocol in Ad hoc Networks

    Ad hoc networks are autonomous systems composed of mobile hosts that are free to move around arbitrarily. Rather than relying on a network infrastructure to perform routing in an Mobile Ad hoc NETwork (MANET) each mobile host serves as a router to forward packets originated from other nodes. Proactive protocols...

    Provided By Sri Krishnadevaraya University

  • White Papers // Dec 2009

    Optimized Time Convergence in Switching and Routing

    The wide deployment of Layer 2/Layer 3 switches in the wiring closet and distribution layers of the campus and enterprise networks has caused lot of dependency on the Spanning Tree Protocol to ensure loop free networks. To define, spanning tree is a protocol designed to eliminate loops in a topology...

    Provided By Sri Krishnadevaraya University

  • White Papers // Jan 2010

    Reliability in MANET's Using Enhanced Double Coverage Broadcasting (EDCB)

    The broadcast operation, as a fundamental service in Mobile Adhoc NETworks (MANETs), is prone to the broadcast storm problem if forwarding nodes are not carefully designated. The objective of reducing broadcast redundancy, while providing high delivery ratio under high transmission error rate is a major challenge in MANETs. This paper...

    Provided By Sri Krishnadevaraya University

  • White Papers // Dec 2009

    A Stable Adaptive Optimization for DSR Protocol in Ad hoc Networks

    Ad hoc networks are autonomous systems composed of mobile hosts that are free to move around arbitrarily. Rather than relying on a network infrastructure to perform routing in an Mobile Ad hoc NETwork (MANET) each mobile host serves as a router to forward packets originated from other nodes. Proactive protocols...

    Provided By Sri Krishnadevaraya University

  • White Papers // Apr 2010

    Comparisons of SAODV and TAODV, DSR Mobile Ad Hoc Network Routing Protocols

    In traditional wireless networks, a base station or access point facilitate communications between nodes within the network and communications with destinations outside the network. In contrast, MANETs forms a network in the absence of fixed infrastructures. The requirement of these networks is only nodes that can interact with radio hardware...

    Provided By Sri Krishnadevaraya University

  • White Papers // Dec 2009

    Optimized Time Convergence in Switching and Routing

    The wide deployment of Layer 2/Layer 3 switches in the wiring closet and distribution layers of the campus and enterprise networks has caused lot of dependency on the Spanning Tree Protocol to ensure loop free networks. To define, spanning tree is a protocol designed to eliminate loops in a topology...

    Provided By Sri Krishnadevaraya University

  • White Papers // Aug 2010

    Decentralized Handoff for Microcellular Mobile Communication System Using Fuzzy Logic

    Efficient handoff algorithms are a cost-effective way of enhancing the capacity and QoS of cellular system. The higher value of hysteresis effectively prevents unnecessary handoffs but causes undesired cell dragging. This undesired cell dragging causes interference or could lead to dropped calls in microcellular environment. The problems are further exacerbated...

    Provided By Sri Krishnadevaraya University

  • White Papers // Apr 2011

    Disseminated Public-Key Management and Certificate Generation Scheme for MANET

    In this paper, the authors first discuss the predominant assail abilities in the mobile ad hoc networks, which have made it much easier to prone to attacks than the traditional wired network. Then they discuss the basic operations of their public-key management scheme: creation of public (and private) keys, issuing...

    Provided By Sri Krishnadevaraya University

  • White Papers // Jan 2011

    Survey of Cluster Based Routing Protocols in Mobile Ad Hoc Networks

    Clustering in Mobile Ad Hoc NETworks (MANETs) has many advantages compared to the traditional networks. But the highly dynamic and unstable nature of MANETs makes it difficult for the cluster based routing protocols to divide a mobile network into clusters and determination of cluster heads for each cluster. In this...

    Provided By Sri Krishnadevaraya University

  • White Papers // Sep 2011

    Credit Card Fraud Detection Analysis

    Computer security and certain aspects of cyber crime is being increasing day by day. The detailed study of the present day most commonly encountered cyber crime like Credit card fraud analysis is presented in this paper. The model reported in this paper is based on Hidden Markov Model(HMM), is a...

    Provided By Sri Krishnadevaraya University