The International Fellowship of Christians and Jews

Displaying 1-40 of 65 results

  • White Papers // Jun 2014

    Review on Vertical Handover Techniques Among Heterogeneous Networks

    One of the major design issues in heterogeneous wireless networks is the support of vertical handover. Vertical handover occurs when a mobile terminal switches from one network to another (e.g., from WLAN to CDMA 1xRTT). Seamless handover between different access technologies is a great challenge as it needs to obey...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jun 2014

    Computer Network Performance Evaluation Based on Network Scalability Using OMNeT++ Simulation Environment

    The performance of the network configurations is measured using simulation environment. The authors have preferred OMNeT++ Version 4.2 (Objective Modular Network Testbed) object oriented modular discrete event network simulation framework with INET framework for OMNeT++ with 2.2.0-ae90ecd release. This paper is focusing on performance evaluation of computer networks through Network...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jun 2014

    Building Applications With Social Networking API's

    An Application Programming Interface (API) specifies how some application components should interact with each other. API can be used to ease the work of programming graphical user interface components. Social networking is web-based services that allow individuals to create a public profile, to create a list of users with whom...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Apr 2014

    Optimization of Malicious Traffic in Optimal Source Based Filtering

    Traffic and spam are the main problems in the data transmission through the network. Many traffic filtering systems have been proposed to find and filter the traffic over the network. The system Optimal Source Filtering (OSF) has implemented a new and optimal filtering mechanism. The new mechanism named as Decentralized...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2014

    A Cluster Based Routing Protocol in Wireless Sensor Network for Energy Consumption

    Wireless Sensor Network (WSN) is a new and fast advancing technology, which is opening up many opportunities in the field of remote sensing and data monitoring. Even though the advances in embedded systems, the energy consumption is still open issue in WSNs. Recently there has been growing interest in the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2014

    Neural Network Based Software Effort Estimation: A Survey

    Software effort estimation is used to estimate how many resources and how many hours are required to develop a software project. The accurate and reliable prediction is the key to success of a project. There are numerous mechanisms in software effort estimation but accurate prediction is still a challenge for...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jan 2014

    Query Recommendation Employing Query Logs in Search Optimization

    In this paper, the authors suggest a method that, given a query presented to a search engine, proposes a list of concerned queries. The concerned queries are founded in antecedently published queries, and can be published by the user to the search engine to tune or redirect the search process....

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Dec 2013

    WPAODV: Wormhole Detection and Prevention Technique

    In Mobile Adhoc NETwork (MANET) mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open entrusted environment with little security arrangement, whether security over MANET is not to...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Oct 2013

    Secure and Efficient Vertical Handover in Heterogeneous Wireless Networks

    Handover occurs when a wireless node switches from one network to another. One of the main requirements of this process is to make it secure by using reliable security mechanisms, but it can decrease performance as well. So it is very essential to maintain balance between security and performance during...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Oct 2013

    A New Public Key Cryptosystem Based on Weil Pairing

    The researchers first proposed public key cryptosystems using the group of points of an elliptic curve over a finite field. The security of these cryptosystems was based upon the presumed intractability of the problem of computing logarithm in the elliptic curve group. Now the authors propose a new cryptosystem over...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Sep 2013

    ID-Based Signature Scheme with Weil Pairing

    Digital signature is an essential component in cryptography. Digital signatures guarantee end-to-end message integrity and authentication information about the origin of a message. In this paper, the authors propose a new identification based digital signature scheme with weil pairing. Also they analyze security and efficiency of their scheme. Security of...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Sep 2013

    Alternative Node Based Energy Depletion and Expected Residual Lifetime Balancing Method for Mobile Ad Hoc Networks

    A mobile ad hoc network is an infrastructure less network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence the authors require efficient balancing techniques (energy depletion or expected residual lifetime, whichever is applicable under specific circumstances) to reduce overload on the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Sep 2013

    A Comparative Study on Dynamic Time Warping (DTW) and Arbitrary Selection Load Balancing (ASLB) Approaches to Heterogeneous P2P Networks

    The World Wide Web (WWW) is a vast network of documents that are linked together a set of protocols defining how the system work and transfer data. The explosion of data traffic on the World Wide Web (WWW), web servers are often experiencing overload from an increasing number of users...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    An Assessment of Worm Hole Attack Over Mobile Ad-Hoc Network as Serious Threats

    Now-a-days, mobile ad hoc networks vulnerable from number of security threats like black hole attack, DOS attack, byzantine attack and wormhole attack. Wormhole attack is one of most important attack and having great attention in recent year. Wormhole attack, demonstrate an illusion over the network that show two far away...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    Performance Evaluation of Fractionally Spaced Constant Modulus Algorithm (FSCMA) in Relation to CMA (Constant Modulus Algorithm) Method for Blind Equalization of Wireless Signals

    Wireless communication is being used for many purposes and has become very frequently used mode of communication. Blind equalization methods are being used to estimate the received signal without the necessity to use the trained sequences in the input. Many methods Constant Modulus Algorithm (CMA), Fractionally Spaced-CMA (FS-CMA), Phase Compensation...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    GSIS: A Secure and Timed- Efficient Stream Loss-Tolerant Authentication Protocol For Vehicular Communications

    In this paper, the authors first identify some unique design requirements in the aspects of security and Time - Efficient Stream Loss - tolerant Authentication (TESLA) for communication between different communication devices in vehicular ad hoc networks. They propose a TESLA broadcast authentication protocol based on group signature and IDentify...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    SMS Security in Mobile Devices: A Survey

    The Short Message Service (SMS) is one of the frequently used mobile services with universal availability in all GSM networks. The current SMS hasn't achieved secure transmission of plaintext between different mobile phone devices. SMS doesn't have its own build-in mechanism to secure the transmitted data because security isn't considered...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jul 2013

    Modified Agglomerative Clustering for Web Users Navigation Behavior

    Clustering is the task of finding natural partitioning within a data set such that data items within the same group are more similar than those within different groups. At present all available clustering techniques for web usage mining are based upon usage patterns derived from user's page preferences. To improve...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2013

    Analysis of Adaptive Group Key Management Protocol Using Network Simulator 2

    IP Multicast is increasingly used as an efficient communication mechanism for group oriented applications. This success urged the development of security mechanisms for that communication model. In dynamic multicast groups, new members may join or current members may leave the group dynamically. Due to dynamic nature of these multicast groups,...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2013

    OSRWQOS: Optimized Secure Routing Protocol With QoS Against Byzantine Attack

    Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc NETworks (MANETs) in military, government and commercial applications. Secure ad hoc networks are expected to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. Routing Algorithm that integrates security and performance requirements are...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2013

    Predicting Reliability of Software Using Thresholds of CK Metrics

    Predicting reliability is one of the key functions of a software system. Many of the software fail due to unreliability. The demand of reliable software is increasing day-by-day. In industry, information on reliability is available too late in the software development process. Hence any corrective action becomes unaffordable. A step...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2013

    LAN Modeling in Rural Areas Based on Variable Metrics Using Fuzzy Logic

    The global scenario of the present world highly needs the communication between the urban areas and the rural areas. To motivate a new system for rural broadband access, there needs the integration of LAN and IEEE 802.11 WLAN technologies. The variable metrics such as access protocol, user traffic profile, buffer...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2013

    Analysis of Multipath MANET Routing Protocols Under Variable Range Transmission Power

    A Mobile Ad Hoc NETwork (MANET) is a collection of mobile wireless nodes connected together to form a dynamic network without the need for any fixed infrastructure. This dynamic and unpredictable nature of MANETs requires multi-path routing. In multipath routing multiple paths are established between a source and destination pair...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2013

    Comparison of Different Methods to Identify Wormhole Attacks in MANETS

    A self-organized network without a central coordinator that changes its topology frequently is called a MANET. Two faraway nodes in a MANET seem to give an impression that they are situated close to each other due to the presence of malicious nodes referred to as worm-hole nodes. Due to the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2013

    PRNG based Symmetric Stream Cipher

    An algorithm of symmetric stream cipher is proposed embedding a PRNG within it. Stream ciphers require a random key stream. A simple exclusive OR operation is needed between the randomly generated key stream and the text character to obtain the cipher text. Randomness of the cipher text depends on the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2013

    Simulation Based Performance Comparison of Various Routing Protocols in MANET Using Network Simulation Tool

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a network temporarily without any centralized administration of the mobile networks. Each node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. Two nodes in such a network can communicate...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Feb 2013

    A Real Time Intrusion Aggregation and Prevention Technique

    Alert aggregation is an important subtask of intrusion detection. The goal is to identify and to cluster different alerts produced by low-level intrusion detection systems, firewalls, etc. belonging to a specific attack instance which has been initiated by an attacker at a certain point in time. Thus, meta-alerts can be...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Feb 2013

    Ant Colony Optimization Based Routing in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consisting of nodes with limited power are deployed to gather useful information from the field. In WSNs it is critical to collect the information in an efficient manner. It is applied in routing and difficult power supply area or area that cannot be reached and some...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Feb 2013

    Examination of Impact of Flooding Attack on MANET and to Accentuate on Performance Degradation

    Mobile Adhoc NETworks (MANET) is new paradigm of wireless networks providing unrestricted mobility to nodes with no fixed or centralized infrastructure. Each node participating in the network acts as router to route the data from source to destination. This characteristic makes MANET more vulnerable to routing attacks. Flooding attack is...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jan 2013

    Design and Implementation of AMRP for Multi Hop Wireless Mobile Ad Hoc Networks

    In this paper, the authors have analyzed the interruption concert of a multi-hop wireless network in which the routes between resource-objective pairs are fixed. It has developed a new queue grouping technique to handle the complex correlations of the service process resulting from the multi-hop nature of the flows and...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jan 2013

    Security Threats in Wireless Sensor Networks in Each Layer

    As the Wireless Sensor Networks (WSN) prove to be more beneficial in real-world applications. At the same time threatened by vulnerabilities. The threats faced by these WSN are similar but not limited to those observed in a simple network of computers or internet. Attacks at all the layers of network...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jan 2013

    Categorization and Rating the Privacy Maintaining Data Mining Proficiencies by Applying a Data Change - Based Model

    In recent years, the data mining proficiencies have met a dangerous challenge due to the altered regarding and concerns of the privacy that is, defending the secrecy of the vital and sore data. Different proficiencies and algorithms have been already demonstrated for privacy preserving data mining, which could be assorted...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jan 2013

    An Anonymous Secure Routing Using OLSR Protocol

    Security and privacy concerns are major issues to be considered in Mobile Ad hoc NETworking (MANET). Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Dec 2012

    A Simulation Based QoS Review of Multipath Routing Protocols for MANET

    A MANET is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. The multipath routing protocols establish efficient communication within the network by discovering multiple routes between a pair of source and destination...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Nov 2012

    Fuzzy Based Priority Scheduler for WiMAX With Improved QoS Constraints

    Wireless interoperability for Microwave Access (WiMAX) is one of the most familiar broadband wireless access technologies that support multimedia transmission. IEEE802.16 Medium Access Control (MAC) covers a large area for bandwidth allocation and Quality of Service (QoS) mechanisms for various types of applications. Nevertheless, the standard lacks a MAC scheduling...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Nov 2012

    Analyzing the Performance of Diverse LEACH Algorithms for Wireless Sensor Networks

    Sensor nodes can be used for continuous sensing, location sensing and event detection with the help of different types of sensors such as seismic, thermal, visual, infrared, magnetic, and many gaseous sensors. Sensor networks have wide range of applications including medical, military, home, etc. All these applications involve vigorous wireless...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Nov 2012

    A Quality Hybrid Service Discovery Protocol

    Hybrid protocol combines the advantages of proactive and reactive routing in ad hoc network. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. In this paper, the authors propose a Quality Hybrid Service Discovery Protocol (QHSDP) for...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Sep 2012

    Evaluation of Enhanced K- MEAN Algorithm to the Student Dataset

    Cluster analysis is one of the major data analysis methods which are widely used for many practical applications in emerging areas like bioinformatics. Conventional database querying methods are inadequate to extract useful information from huge data banks. Cluster analysis is one of the major data analysis methods and the k-means...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Sep 2012

    Throughput Analysis of Symmetric Algorithms

    Today's world, for secure data transmission via internet or any public network, there is no alternative to cryptography. The role of cryptography is most important in the field of network security. In this paper, the authors compare the various cryptographic algorithms. On the basis of parameter taken as time various...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Apr 2012

    Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks

    Mobile Ad Hoc NETwork (MANET) is an autonomous mobile nodes forming network in an infrastructure less environment and has dynamic topology. MANET reactive protocols always not have low control overhead. The control overhead for reactive protocols is more sensitive to the traffic load, in terms of the number of traffic...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2012

    FuGeIDS : Fuzzy Genetic Paradigms in Intrusion Detection Systems

    With the increase in the number of security threats, intrusion detection systems have evolved as a significant countermeasure against these threats. And as such, the topic of intrusion detection systems has become one of the most prominent research topics in recent years. This paper gives an overview of the intrusion...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Apr 2012

    Hybrid Domain Based Face Recognition System

    Biometric authentication is the primary and prevalent system for security and surveillance activities in the past several years. The automation in every field of daily life has made human identification and verification is a prime issue for ensuring the security. The biometric techniques are relates to the parts of human...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Apr 2012

    A Model for Performance Enhancement of Steganography Through Dynamic Key Cryptography

    In today's, Security are a big and challenging issues, for where the information has been transmitted. There are lots of techniques come in existence, but most of them are struggle against hackers and unauthorized users from last many decades. There are two most popular and reliable techniques has been used...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2012

    Modern Fiber Optic Submarine Cable Telecommunication Systems Planning for Explosive Bandwidth Needs at Different Deployment Depths

    The explosive bandwidth needs, especially in the inter data center market, have pushed transmission data rates to 100 Gbit/sec and beyond. Current terrestrial fibers are inadequate for long haul, high bandwidth deployments. To solve these problems a new fiber is introduced for terrestrial high bandwidth deployments: different polymeric core fibers...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2012

    A Study of Web Usage Mining Research Tools

    Web usage mining focuses on techniques that could predict user behavior while the user interacts with the Web. It tries to make sense of the data generated by the Web surfer's sessions or behaviors. There is an attempt to provide an overview of the state of the art in the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Apr 2012

    Performance Enhancement of MC-CDMA Systems Through MAP Based Multiuser Detection

    The joint Multi-User Detection (MUD) and turbo coding are the two powerful techniques for enhancing the performance of the MC-CDMA systems. The Multiple Access Interference (MAI) is one of the factors that affect the Bit Error Rate (BER) performance of the MC-CDMA systems. Maximum A Posteriori (MAP) criterion based multi...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jun 2012

    Admission Control Prototype for Real-Time Databases

    The authors suggest and measure an admission control prototype for RTDBS, in which a transaction is presented to the system as a pair of procedures: a primary task, and a recovery block. The performance necessities of the main task are not known a priori, whereas those of the recovery block...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jun 2012

    A Novel and Efficient Dynamic Key Management Technique in Wireless Sensor Network

    Key management in wireless sensor network is a challenging task because public key cryptosystem are unsuitable for using in resource constrained sensor nodes, and the nodes could be physically compromised by a rival. Due to resource constraints, it is infeasible to apply traditional key management techniques in WSN. Numerous dynamic...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jun 2012

    Modbus Based Multinode Irrigation Automation

    As the people know that cultivating some plants and flowers in a closed environment requires precise control of humidity, temperature, light intensity and becomes risky and difficult. So if the people automate this process by using sensors and actuators whose settings are set accordingly by the user then the work...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jun 2012

    Signal Groups of Compatible Graph in Traffic Control Problems

    Signal Groups of a compatibility graph is used to solve conflict between the traffic streams and hence can be used as a solution for traffic control problem at an intersection. In this paper, the authors have considered cliques of the compatible graph as signal groups and the set of signal...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jul 2012

    UML Modeling for the Compression of an Image File

    Unified Modeling Language (UML) is one of the important modeling languages used for the visual representation of the research problem. In the present paper, UML model has been designed for the compression of any image using transform method because compressed image take a very less transmission time for sending image...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jul 2012

    Surveying Solutions to Securing On-Demand Routing Protocols in MANETs

    A Mobile ad hoc NETwork or MANET is a wireless network of mobile devices that has the ability to self-configure and self-organise and is characterised by an absence of centralised administration and network infrastructure. An appreciable number of routing protocols used in a typical MANET have left the critical aspect...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jul 2012

    A Distributed and Co-Operative Approach to Botnet Detection Using Gossip Protocol

    Bots, in recent times, have posed a major threat to enterprise networks. With the distributed nature of the way in which botnets operate, the problems faced by enterprises have become acute. A bot is a program that operates as an agent for a user and runs automated tasks over the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jul 2012

    Healthcare Monitoring System Using Wireless Sensor Network

    Using Wireless Sensor Networks (WSNs) in health care system has yielded a tremendous effort in recent years. However, in most of these researches, tasks like sensor data processing, health state decisions making and emergency messages sending are completed by a remote server. Transmitting and handing with a large scale of...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2012

    Accessing a Network Using a Secure Android Application

    Security plays a vital role in today's mobile world. There are security issues like sniffing of data while accessing information through open channel. Proper security measures can help to deal with the common security threats faced by mobile phone users such as data protection, privacy, application and personal information security....

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jul 2012

    A Review of Techniques to Mitigate Sybil Attacks

    Any decentralised distributed network is particularly vulnerable to the Sybil attack wherein a malicious node masquerades as several different nodes, called Sybil nodes, simultaneously in an attempt to disrupt the proper functioning of the network. Such attacks may cause damage on a fairly large scale especially since they are difficult...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2012

    Cloud Computing Issues at Design and Implementation Levels - A Survey

    Cloud Computing is an emerging paradigm in the advanced network arena that facilitates the users to access shared computing resources through internet-on-demand. Cloud Computing has been widely used since it brings tremendous improvements in business. Cloud users are expected to grow exponentially in the future. In order to meet the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2010

    Parallel Implementation of Genetic Algorithm Using K-Means Clustering

    The existing clustering algorithm has a sequential execution of the data. The speed of the execution is very less and more time is taken for the execution of a single data. A new algorithm Parallel Implementation of Genetic Algorithm using KMeans Clustering (PIGAKM) is proposed to overcome the existing algorithm....

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Dec 2011

    Video Surveillance System Using Motion Detection - A Survey

    Now-a-days, much of the video surveillance systems require to manually setting a motion detection sensitivity level to generate motion alarms. The performance of motion detection algorithms, embedded in CCTV camera and digital video recorder usually depends upon the preselected motion sensitivity level, which works in all environmental conditions. Due to...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Nov 2011

    Performance Analysis of Integer Wavelet Packet Transform (IWPT)- OFDM, WPT-OFDM and FFT-OFDM Based on QAM Modulation

    Now-a-day's OFDM is widely used in various application mainly in wireless communication. It suffers from Inter Symbol Interference (ISI). To mitigate the effect of ISI the Cyclic Prefix (CP) is used resulting loss in bandwidth. So DWT and WPT are used in place of FFT. By these transform the spectral...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Nov 2011

    Performance Analysis of Adaptive Switching Between Space-Time and Space-Frequency Block Coded OFDM Systems Using ZF and MMSE Techniques

    This paper focuses on the implementation and performance analysis of adaptive switching between STBC and SFBC OFDM systems. Here, in this paper the authors proposed an adaptive transmission technique for MIMO OFDM systems using adaptive equalization algorithms (ZF,MMSE) where the channel response are unknown a priori and time variant. In...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Sep 2013

    Alternative Node Based Energy Depletion and Expected Residual Lifetime Balancing Method for Mobile Ad Hoc Networks

    A mobile ad hoc network is an infrastructure less network, where nodes are free to move independently in any direction. The nodes have limited battery power; hence the authors require efficient balancing techniques (energy depletion or expected residual lifetime, whichever is applicable under specific circumstances) to reduce overload on the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Oct 2013

    A New Public Key Cryptosystem Based on Weil Pairing

    The researchers first proposed public key cryptosystems using the group of points of an elliptic curve over a finite field. The security of these cryptosystems was based upon the presumed intractability of the problem of computing logarithm in the elliptic curve group. Now the authors propose a new cryptosystem over...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    Performance Evaluation of Fractionally Spaced Constant Modulus Algorithm (FSCMA) in Relation to CMA (Constant Modulus Algorithm) Method for Blind Equalization of Wireless Signals

    Wireless communication is being used for many purposes and has become very frequently used mode of communication. Blind equalization methods are being used to estimate the received signal without the necessity to use the trained sequences in the input. Many methods Constant Modulus Algorithm (CMA), Fractionally Spaced-CMA (FS-CMA), Phase Compensation...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    Heterogeneous LEACH Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are networks of large number of tiny, battery powered sensor nodes having limited on-board storage, processing, and radio capabilities. Nodes sense and send their reports toward a processing center which is called base station. Since this transmission and reception process consumes lots of energy as compare...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    GSIS: A Secure and Timed- Efficient Stream Loss-Tolerant Authentication Protocol For Vehicular Communications

    In this paper, the authors first identify some unique design requirements in the aspects of security and Time - Efficient Stream Loss - tolerant Authentication (TESLA) for communication between different communication devices in vehicular ad hoc networks. They propose a TESLA broadcast authentication protocol based on group signature and IDentify...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jul 2013

    Modified Agglomerative Clustering for Web Users Navigation Behavior

    Clustering is the task of finding natural partitioning within a data set such that data items within the same group are more similar than those within different groups. At present all available clustering techniques for web usage mining are based upon usage patterns derived from user's page preferences. To improve...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    An Assessment of Worm Hole Attack Over Mobile Ad-Hoc Network as Serious Threats

    Now-a-days, mobile ad hoc networks vulnerable from number of security threats like black hole attack, DOS attack, byzantine attack and wormhole attack. Wormhole attack is one of most important attack and having great attention in recent year. Wormhole attack, demonstrate an illusion over the network that show two far away...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2013

    SMS Security in Mobile Devices: A Survey

    The Short Message Service (SMS) is one of the frequently used mobile services with universal availability in all GSM networks. The current SMS hasn't achieved secure transmission of plaintext between different mobile phone devices. SMS doesn't have its own build-in mechanism to secure the transmitted data because security isn't considered...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2013

    Predicting Reliability of Software Using Thresholds of CK Metrics

    Predicting reliability is one of the key functions of a software system. Many of the software fail due to unreliability. The demand of reliable software is increasing day-by-day. In industry, information on reliability is available too late in the software development process. Hence any corrective action becomes unaffordable. A step...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2013

    Analysis of Adaptive Group Key Management Protocol Using Network Simulator 2

    IP Multicast is increasingly used as an efficient communication mechanism for group oriented applications. This success urged the development of security mechanisms for that communication model. In dynamic multicast groups, new members may join or current members may leave the group dynamically. Due to dynamic nature of these multicast groups,...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2013

    Comparison of Different Methods to Identify Wormhole Attacks in MANETS

    A self-organized network without a central coordinator that changes its topology frequently is called a MANET. Two faraway nodes in a MANET seem to give an impression that they are situated close to each other due to the presence of malicious nodes referred to as worm-hole nodes. Due to the...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Mar 2013

    Simulation Based Performance Comparison of Various Routing Protocols in MANET Using Network Simulation Tool

    A Mobile Ad hoc NETwork (MANET) is a collection of wireless mobile nodes forming a network temporarily without any centralized administration of the mobile networks. Each node in MANET moves arbitrarily making the multi-hop network topology to change randomly at unpredictable times. Two nodes in such a network can communicate...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // May 2013

    OSRWQOS: Optimized Secure Routing Protocol With QoS Against Byzantine Attack

    Several routing protocols have been proposed in recent years for possible deployment of Mobile Ad hoc NETworks (MANETs) in military, government and commercial applications. Secure ad hoc networks are expected to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. Routing Algorithm that integrates security and performance requirements are...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Nov 2012

    A Quality Hybrid Service Discovery Protocol

    Hybrid protocol combines the advantages of proactive and reactive routing in ad hoc network. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. In this paper, the authors propose a Quality Hybrid Service Discovery Protocol (QHSDP) for...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Nov 2012

    Analyzing the Performance of Diverse LEACH Algorithms for Wireless Sensor Networks

    Sensor nodes can be used for continuous sensing, location sensing and event detection with the help of different types of sensors such as seismic, thermal, visual, infrared, magnetic, and many gaseous sensors. Sensor networks have wide range of applications including medical, military, home, etc. All these applications involve vigorous wireless...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Sep 2012

    Evaluation of Enhanced K- MEAN Algorithm to the Student Dataset

    Cluster analysis is one of the major data analysis methods which are widely used for many practical applications in emerging areas like bioinformatics. Conventional database querying methods are inadequate to extract useful information from huge data banks. Cluster analysis is one of the major data analysis methods and the k-means...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Aug 2012

    Survey of Elliptic Curve Scalar Multiplication Algorithms

    Researchers proposed Elliptic Curve Cryptography (ECC) and it is gaining a wide acceptance as an alternative to the conventional cryptosystems like RSA, DSA and DH .The standard bodies accepted Elliptic Curve Cryptography (ECC) as an efficient and alternative public key cryptosystem for the next generation cryptographic applications. The most dominant...

    Provided By The International Fellowship of Christians and Jews

  • White Papers // Jan 2013

    An Anonymous Secure Routing Using OLSR Protocol

    Security and privacy concerns are major issues to be considered in Mobile Ad hoc NETworking (MANET). Several routing protocols have been proposed to achieve both routing and data packets security. In order to achieve privacy, the anonymous routing concept has been introduced and few protocols have been proposed for use...

    Provided By The International Fellowship of Christians and Jews