The International Journal of Advanced Networking and Applications

Displaying 1-32 of 32 results

  • White Papers // Feb 2012

    A Survey on Security Issues in Ad Hoc Routing Protocols and Their Mitigation Techniques

    Mobile Ad hoc NETworks (MANETS) are transient networks of mobile nodes, connected through wireless links, without any fixed infrastructure or central management. Due to the self-configuring nature of these networks, the topology is highly dynamic. This makes the Ad Hoc Routing Protocols in MANETS highly vulnerable to serious security issues....

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jan 2012

    Optimal Routing in Ad-Hoc Network Using Genetic Algorithm

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. The topology of the ad hoc network may change rapidly and unexpectedly. One of the most problems encountered in these networks, is finding the...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jan 2012

    Counter Measures to Combat Misuses of MAC Address Spoofing Techniques

    In a computer network several communicating devices are connected to a common shared communication medium. A network interfacing card or a wireless network card is typically used to connect computers on a network. This gives rise to the need of unique identification mechanism to be followed for each of the...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jan 2012

    A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks

    In this paper a wormhole detection technique has been proposed which makes use of AODV as an on demand routing protocol and secure neighbor detection protocol with certain modifications. In the technique, sender floods the route request packets in search of destination and in return the receiver responds by sending...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    An Effective Method for Attack RSA Strategy

    The protection on many public key encoding schemes depended on the intractability of detecting the integer factoring problem such as RSA scheme. However, there are great deals of researches regarding the RSA factoring modulus compared with the other type of attack the RSA scheme. So the need for more methods...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Improving Quality of Service Through Secured Routing in Mobile Ad Hoc Networks

    Due to the high flexibility, mobility and low cost features, wireless ad hoc networks are widely used. A particularly challenging problem is how to feasibly detect and defend the major attacks against routing protocols of such networks that have susceptible links and dynamic topology. Most of the existing secure routing...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Strengthening of Data Security Against Its Attack

    This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Wireless Mobile Communication - A Study of 3G Technology

    Third Generation (3G) mobile devices and services will transform wireless communications in to on-line, real-time connectivity. 3G wireless technology will allow an individual to have immediate access to location-specific services that offer information on demand. Mobile phones are rapidly becoming the preferred means of personal communication, creating the world's largest...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Adaptive Routing in Dynamic Ad-Hoc Network

    The dynamics of an ad hoc network are a challenge to protocol design because mobility of nodes leads to unstable routing, and consequently flows encounter fluctuations in resource availability on various paths during the lifetime of a session. This has become serious, especially for those protocols based on single-path reservation,...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    A Novel Efficient Approximate Query Processing in P2P Network

    Peer-To-Peer (P2P) databases are becoming prevalent on the Internet for distribution and sharing of documents, applications, and other digital media. The problem of answering large-scale ad hoc analysis queries, for example, aggregation queries, on these databases poses unique challenges. Exact solutions can be time consuming and difficult to implement, given...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Efficient Data Reporting Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used for collection of data from the area of interest. WSNs deployment, application requirement and nature of phenomena have an effect on the generation of data. The data generated can be redundant and injection of redundant data into the network reduces the lifetime of energy...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Analysis of Compute Vs Retrieve Intensive Web Applications and Its Impact on the Performance of a Web Server

    The World Wide Web (WWW) has undergone remarkable change over the past few years, placing substantially heavy load on Web servers. Today's web servers host web applications that demand high computational resources. Also some applications require heavy database retrieval processing, making server load even more critical. In this paper, performance...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Nov 2011

    Scheduling Tasks to Minimize the Total Computation and Communication Makespan

    The authors study the problem of scheduling tasks in a distributed system where the data (and code) for a program may reside on a processor different from the one where it will be executed. The scheduling of the tasks is more complex than classical ones as one must not only...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Nov 2011

    Comparison of RSA-Threshold Cryptography and ECC-Threshold Cryptography for Small Mobile Adhoc Networks

    A mobile ad hoc network is a special type of wireless network in which a collection of mobile hosts with wireless network interfaces may form a temporary network. Without the aid of proper fixed infrastructure, providing secure communications is a big challenge. The strength of the security solutions very much...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Nov 2011

    Algorithms to Improve Resource Utilization and Request Acceptance Rate in IaaS Cloud Scheduling

    Computing infrastructure provisioning in Infrastructure as a Service (IaaS) cloud is done in the form of virtual machines. Haizea, a resource lease manager, provides four types of leases: Immediate, Best Effort (BE), Advance Reservation (AR) and Dead Line Sensitive (DLS). AR leases are most privileged leases with "AR preempts other...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Oct 2011

    Validation of Internet Application: Study, Analysis and Evaluation

    Today, testing applications for Internet (web sites and other applications) is being verified using proprietary test solutions. The Internet Security became a very important and complex field of researches in the people present time, especially if the authors apply this to the discussion of Internet protocols as basic interfaces for...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Oct 2011

    Comparative Analysis of Routing Attacks in Ad Hoc Network

    In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as black-hole node attacks. The...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Sep 2011

    LAN Performance Ratings Using Fuzzy Set Theory

    A single dimension cannot quantify or properly express the performance of a LAN. It is very difficult to interpret LAN metrics without knowing what application (users) are involved. LAN performance measurement metrics are resource usages, processing delays, throughput, availability, fairness of measured data, and communigram. LAN policies need to be...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Sep 2011

    Priority Based Congestion Control Routing in Wireless Mesh Network

    Wireless Mesh Network (WMN) is a wireless networking model which currently attracts research and industry. In WMN every node passes information to the nearest node and there may be number of hops from one node to the other. In WMN the information is forward using the best possible route to...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Sep 2011

    Retrieving Packets From Losing During Service Disruption Time, During Vertical Handover Among UMTS and WLAN

    In voice activity based communication Choi et al show that using of mutual silence period to do the Vertical Hand-Over (VHO) is a perfect choice to minimize the packet loss. However according to their proposal, after starting the VHO and before completing it, if one party breaks the silence pushing...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jul 2011

    Bandwidth Allocation for Wireless Data Dissemination in Multi-Cell Environments Using Optimization Techniques

    Effective data management and resource management are vital to the success of emerging mobile data applications. the allocation of resources such as Bandwidth, buffer in mobile cellular networks becomes an increasingly important issue. In addition, varying mobility and various service class requirements of the present multimedia applications makes it a...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jul 2011

    Ant Based Techniques for QoS Routing in Mobile Ad Hoc Network: An Overview

    Mobile Ad Hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing heterogeneous network infrastructure. Quality of Service (QoS) support for MANET is a challenging task due to dynamic topology and limited resource. The main purpose of QoS routing...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jun 2011

    An Integrated Survey in Efficient Energy Management for WSN Using Architecture Approach

    Wireless Sensor Network consist of large number of sensing devices, which are equipped with limited radio communication capabilities and limited computing which is used for many purposes in the present and the future. Clustering and routing in wireless sensor networks for the transfer of information from sensor nodes to base...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jun 2011

    Detection Architecture of Application Layer DDoS Attack for Internet

    Internet was intended with functionality and not Security in mind. For this reason, its architecture has some intrinsic weaknesses and bugs called vulnerability which results in successful origin of DDOS attacks. Over the time, researchers proposed many solutions to prevent the DDOS attack from different OSI layers, on the other...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // May 2011

    Dynamic Resource Allocation in Computing Clouds Through Distributed Multiple Criteria Decision Analysis Using PROMETHEE Method

    In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this technical report, the authors investigate a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // May 2011

    Study of Various Attacks in MANET and Elaborative Discussion of Rushing Attack on DSR With Clustering Scheme

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // May 2011

    Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web

    The advent of the web has resulted in even larger demand for managing privacy, quality and security of information, info and data effectively. This can be because of the fact that these days information on the web represents the biggest body of knowledge ever accessible to any person. Semantic web...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Apr 2011

    Secured Reconfigurable Software Defined Radio Using OTA Software Download

    Dynamic Reconfiguration of lower layers of the protocol stacks used in communication terminals is a key for the development of future multimode software radio. Together with the use of software downloading, future terminals will become a platform to support the deployment of yet unspecified services and applications. Today software radio...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Mar 2011

    How Good Is the DES Algorithm in Image Ciphering?

    Digital Images and video encryption plays an important role in today's multimedia world. Many encryption schemes have been proposed to provide security for digital images. Usually the symmetric key ciphering algorithms are used in encrypting digital images because it is fast and use the techniques for block and stream ciphers....

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Oct 2010

    An Efficient Congestion Avoidance Scheme for Mobile Healthcare Wireless Sensor Networks

    Wireless Sensor Networks (WSN) in healthcare environment continuously monitors critically ailing patients. Congestion is one of the major challenges in WSN; it causes overall channel quality to degrade, loss rates to raise, leads to buffer drops and increased delays, and tends to be grossly unfair toward nodes whose data has...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Aug 2010

    PAPR Reduction Using Modified Selective Mapping Technique

    Multi-carrier modulation is an attractive technique for fourth generation wireless communication. Orthogonal Frequency Division Multiplexing (OFDM) is multi-carrier transmission scheme. Its high Peak to Average Power Ratio (PAPR) of the transmitted signal is a major drawback. In this paper, the authors propose to reduce PAPR by probabilistic method Modified selective...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jun 2010

    QoS for Real Rime Transmission on MANET

    The Ad hoc network is set up with multiple wireless devices without any infrastructure. Its employment is favored in many environments. Thus, many efforts are put in ad hoc networks at both the MAC and routing layers. Meanwhile, QoS aware issues are considered in both MAC and routing layers for...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jan 2012

    A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks

    In this paper a wormhole detection technique has been proposed which makes use of AODV as an on demand routing protocol and secure neighbor detection protocol with certain modifications. In the technique, sender floods the route request packets in search of destination and in return the receiver responds by sending...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Nov 2011

    Algorithms to Improve Resource Utilization and Request Acceptance Rate in IaaS Cloud Scheduling

    Computing infrastructure provisioning in Infrastructure as a Service (IaaS) cloud is done in the form of virtual machines. Haizea, a resource lease manager, provides four types of leases: Immediate, Best Effort (BE), Advance Reservation (AR) and Dead Line Sensitive (DLS). AR leases are most privileged leases with "AR preempts other...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Efficient Data Reporting Protocol for Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are used for collection of data from the area of interest. WSNs deployment, application requirement and nature of phenomena have an effect on the generation of data. The data generated can be redundant and injection of redundant data into the network reduces the lifetime of energy...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jan 2012

    Optimal Routing in Ad-Hoc Network Using Genetic Algorithm

    An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. The topology of the ad hoc network may change rapidly and unexpectedly. One of the most problems encountered in these networks, is finding the...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Feb 2012

    A Survey on Security Issues in Ad Hoc Routing Protocols and Their Mitigation Techniques

    Mobile Ad hoc NETworks (MANETS) are transient networks of mobile nodes, connected through wireless links, without any fixed infrastructure or central management. Due to the self-configuring nature of these networks, the topology is highly dynamic. This makes the Ad Hoc Routing Protocols in MANETS highly vulnerable to serious security issues....

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Oct 2011

    Comparative Analysis of Routing Attacks in Ad Hoc Network

    In the mobile ad hoc networks the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node. But in such mobile networks, routing protocols are vulnerable to various kinds of security attacks such as black-hole node attacks. The...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jan 2012

    Counter Measures to Combat Misuses of MAC Address Spoofing Techniques

    In a computer network several communicating devices are connected to a common shared communication medium. A network interfacing card or a wireless network card is typically used to connect computers on a network. This gives rise to the need of unique identification mechanism to be followed for each of the...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    An Effective Method for Attack RSA Strategy

    The protection on many public key encoding schemes depended on the intractability of detecting the integer factoring problem such as RSA scheme. However, there are great deals of researches regarding the RSA factoring modulus compared with the other type of attack the RSA scheme. So the need for more methods...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Apr 2011

    Secured Reconfigurable Software Defined Radio Using OTA Software Download

    Dynamic Reconfiguration of lower layers of the protocol stacks used in communication terminals is a key for the development of future multimode software radio. Together with the use of software downloading, future terminals will become a platform to support the deployment of yet unspecified services and applications. Today software radio...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Sep 2011

    LAN Performance Ratings Using Fuzzy Set Theory

    A single dimension cannot quantify or properly express the performance of a LAN. It is very difficult to interpret LAN metrics without knowing what application (users) are involved. LAN performance measurement metrics are resource usages, processing delays, throughput, availability, fairness of measured data, and communigram. LAN policies need to be...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Oct 2011

    Validation of Internet Application: Study, Analysis and Evaluation

    Today, testing applications for Internet (web sites and other applications) is being verified using proprietary test solutions. The Internet Security became a very important and complex field of researches in the people present time, especially if the authors apply this to the discussion of Internet protocols as basic interfaces for...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Improving Quality of Service Through Secured Routing in Mobile Ad Hoc Networks

    Due to the high flexibility, mobility and low cost features, wireless ad hoc networks are widely used. A particularly challenging problem is how to feasibly detect and defend the major attacks against routing protocols of such networks that have susceptible links and dynamic topology. Most of the existing secure routing...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Nov 2011

    Comparison of RSA-Threshold Cryptography and ECC-Threshold Cryptography for Small Mobile Adhoc Networks

    A mobile ad hoc network is a special type of wireless network in which a collection of mobile hosts with wireless network interfaces may form a temporary network. Without the aid of proper fixed infrastructure, providing secure communications is a big challenge. The strength of the security solutions very much...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Analysis of Compute Vs Retrieve Intensive Web Applications and Its Impact on the Performance of a Web Server

    The World Wide Web (WWW) has undergone remarkable change over the past few years, placing substantially heavy load on Web servers. Today's web servers host web applications that demand high computational resources. Also some applications require heavy database retrieval processing, making server load even more critical. In this paper, performance...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Sep 2011

    Retrieving Packets From Losing During Service Disruption Time, During Vertical Handover Among UMTS and WLAN

    In voice activity based communication Choi et al show that using of mutual silence period to do the Vertical Hand-Over (VHO) is a perfect choice to minimize the packet loss. However according to their proposal, after starting the VHO and before completing it, if one party breaks the silence pushing...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Nov 2011

    Scheduling Tasks to Minimize the Total Computation and Communication Makespan

    The authors study the problem of scheduling tasks in a distributed system where the data (and code) for a program may reside on a processor different from the one where it will be executed. The scheduling of the tasks is more complex than classical ones as one must not only...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jul 2011

    Bandwidth Allocation for Wireless Data Dissemination in Multi-Cell Environments Using Optimization Techniques

    Effective data management and resource management are vital to the success of emerging mobile data applications. the allocation of resources such as Bandwidth, buffer in mobile cellular networks becomes an increasingly important issue. In addition, varying mobility and various service class requirements of the present multimedia applications makes it a...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Sep 2011

    Priority Based Congestion Control Routing in Wireless Mesh Network

    Wireless Mesh Network (WMN) is a wireless networking model which currently attracts research and industry. In WMN every node passes information to the nearest node and there may be number of hops from one node to the other. In WMN the information is forward using the best possible route to...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jul 2011

    Ant Based Techniques for QoS Routing in Mobile Ad Hoc Network: An Overview

    Mobile Ad Hoc NETwork (MANET) is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing heterogeneous network infrastructure. Quality of Service (QoS) support for MANET is a challenging task due to dynamic topology and limited resource. The main purpose of QoS routing...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Strengthening of Data Security Against Its Attack

    This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Oct 2010

    An Efficient Congestion Avoidance Scheme for Mobile Healthcare Wireless Sensor Networks

    Wireless Sensor Networks (WSN) in healthcare environment continuously monitors critically ailing patients. Congestion is one of the major challenges in WSN; it causes overall channel quality to degrade, loss rates to raise, leads to buffer drops and increased delays, and tends to be grossly unfair toward nodes whose data has...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jun 2010

    QoS for Real Rime Transmission on MANET

    The Ad hoc network is set up with multiple wireless devices without any infrastructure. Its employment is favored in many environments. Thus, many efforts are put in ad hoc networks at both the MAC and routing layers. Meanwhile, QoS aware issues are considered in both MAC and routing layers for...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Aug 2010

    PAPR Reduction Using Modified Selective Mapping Technique

    Multi-carrier modulation is an attractive technique for fourth generation wireless communication. Orthogonal Frequency Division Multiplexing (OFDM) is multi-carrier transmission scheme. Its high Peak to Average Power Ratio (PAPR) of the transmitted signal is a major drawback. In this paper, the authors propose to reduce PAPR by probabilistic method Modified selective...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // May 2011

    Dynamic Resource Allocation in Computing Clouds Through Distributed Multiple Criteria Decision Analysis Using PROMETHEE Method

    In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this technical report, the authors investigate a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jun 2011

    Detection Architecture of Application Layer DDoS Attack for Internet

    Internet was intended with functionality and not Security in mind. For this reason, its architecture has some intrinsic weaknesses and bugs called vulnerability which results in successful origin of DDOS attacks. Over the time, researchers proposed many solutions to prevent the DDOS attack from different OSI layers, on the other...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // May 2011

    Current Security Considerations for Issues and Challenges of Trustworthy Semantic Web

    The advent of the web has resulted in even larger demand for managing privacy, quality and security of information, info and data effectively. This can be because of the fact that these days information on the web represents the biggest body of knowledge ever accessible to any person. Semantic web...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Jun 2011

    An Integrated Survey in Efficient Energy Management for WSN Using Architecture Approach

    Wireless Sensor Network consist of large number of sensing devices, which are equipped with limited radio communication capabilities and limited computing which is used for many purposes in the present and the future. Clustering and routing in wireless sensor networks for the transfer of information from sensor nodes to base...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // May 2011

    Study of Various Attacks in MANET and Elaborative Discussion of Rushing Attack on DSR With Clustering Scheme

    An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Wireless Mobile Communication - A Study of 3G Technology

    Third Generation (3G) mobile devices and services will transform wireless communications in to on-line, real-time connectivity. 3G wireless technology will allow an individual to have immediate access to location-specific services that offer information on demand. Mobile phones are rapidly becoming the preferred means of personal communication, creating the world's largest...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Mar 2011

    How Good Is the DES Algorithm in Image Ciphering?

    Digital Images and video encryption plays an important role in today's multimedia world. Many encryption schemes have been proposed to provide security for digital images. Usually the symmetric key ciphering algorithms are used in encrypting digital images because it is fast and use the techniques for block and stream ciphers....

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    Adaptive Routing in Dynamic Ad-Hoc Network

    The dynamics of an ad hoc network are a challenge to protocol design because mobility of nodes leads to unstable routing, and consequently flows encounter fluctuations in resource availability on various paths during the lifetime of a session. This has become serious, especially for those protocols based on single-path reservation,...

    Provided By The International Journal of Advanced Networking and Applications

  • White Papers // Dec 2011

    A Novel Efficient Approximate Query Processing in P2P Network

    Peer-To-Peer (P2P) databases are becoming prevalent on the Internet for distribution and sharing of documents, applications, and other digital media. The problem of answering large-scale ad hoc analysis queries, for example, aggregation queries, on these databases poses unique challenges. Exact solutions can be time consuming and difficult to implement, given...

    Provided By The International Journal of Advanced Networking and Applications