The World

Displaying 1-40 of 403 results

  • White Papers // Dec 2014

    Analysis of Wavelet Families on Audio Steganography Using AES

    With the growing trends in wireless network in this modern era, more and more multimedia data are generated and transmitted. So the effective ways to ensure their security are increased. This can be achieved by implementing steganography techniques. Audio steganography is more challenging compared to image or video steganography. There...

    Provided By The World

  • White Papers // Dec 2014

    HEFT Based Cloud Auto-Scaling Algorithm with Budget Constraints

    Cloud computing now-a-days is playing major role in processing enterprise and personal applications. Its dynamic scalability enables users to scale up/down underlying infrastructure in response to dynamic performance behaviors. This benefit provides the basis for solving performance-resource mapping problem when deploying an application on cloud. Many researches on exploring efficient...

    Provided By The World

  • White Papers // Dec 2014

    Performance Analysis of Security Protocol for Advanced Metering Infrastructure in Smart Grid

    The smart grid is a network of computers and power infrastructures that monitor and manage energy usage. This paper aims to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security. A security protocol, Integrated Authentication...

    Provided By The World

  • White Papers // Dec 2014

    Survey on Minimizing Energy Consumption in Mobile Adhoc Networks

    Mobile ad hoc network consists of nodes that move arbitrarily. It leads to dynamic topologies. Power failure of a mobile node not only affects the node itself but also its ability to forward packet on behalf of others and the overall network life time. For this reason many research efforts...

    Provided By The World

  • White Papers // Dec 2014

    Analysis on Environmental Decision in Artificial Intelligence System for Multi Disciplinary Applications

    An effective protection of the people environment is largely dependent on the quality of the available information used to make an appropriate decision. Problems dissent when the quantities of forthcoming collection are huge and non homogenous which are future from some antithetical disciplines or sources and their propertied could not...

    Provided By The World

  • White Papers // Dec 2014

    A Survey of Routing Attacks and Detection Schemes in MANET

    The insecurity of the wireless links, power and energy constraints, poor physical protection of nodes in a hostile environment, and the vulnerability of statically configured security schemes poses challenges for routing and secure data transfer in wireless networks. No part or component of the network is dedicated to support specific...

    Provided By The World

  • White Papers // Nov 2014

    Optimal Contention Window Selection in IEEE 802.11 MAC Protocol for Better Performance of Wireless Networks

    In this paper, the authors investigate the impact of network size and contention window on the performance of the IEEE 802.11 MAC protocol. The performance of any network needs to be evaluated on certain criteria, these criteria then decide the basis of performance of any system. Study on wireless networks'...

    Provided By The World

  • White Papers // Nov 2014

    E-Mail Fusion with Graph Based Approach Stipulating OPass Security

    Most users are satiated with separately logging in into their multiple accounts, and hence end up spending a large amount of time in accessing them. It becomes a tedious task to remember all email id's and passwords for all their accounts. In this paper, the authors present a single framework...

    Provided By The World

  • White Papers // Nov 2014

    Quick Predictive Handover to Ensure Optimal QoS in Heterogeneous Mobile Network Platform

    Recently these day, mobile IPv6 based mobile networks are increasing with the widespread popularity of cutting edge wireless internet connectivity. As Internet users are moving away from fixed connections to mobile connections in dealing with their day-to-day activities. In order to remain connected to the Internet while on the go,...

    Provided By The World

  • White Papers // Oct 2014

    Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control

    In view of the invasive web traffic, this paper propose a distributed traffic management framework, in which routers area unit deployed with intelligent rate controllers to tackle the traffic mass. in contrast to different express control protocols that ought to estimate network parameters (e.g., link latency, bottleneck information measure, packet...

    Provided By The World

  • White Papers // Oct 2014

    Secure Sharing in Distributed Information Management Applications

    Interaction between entities that may not trust each other is now commonplace on the Internet. This paper focuses on the specific problem of sharing information between distrusting parties. Previous work in this area shows that privacy and utility can co-exist, but often do not provide strong assurances of one or...

    Provided By The World

  • White Papers // Oct 2014

    Facilitating Indirect Mutual Trust for Cloud Storage Systems

    In this digital age, organizations produce a large amount of sensitive data including personal information such as financial data. The local management of such humongous amount of data is problematic and costly due to the requirements of high storage capacity and experienced personnel. Storage-as-a-Service (SaaS) offered by Cloud Service Providers...

    Provided By The World

  • White Papers // Oct 2014

    Opportunistic MANETs: Quality Will Frame for Low Transmission Power

    Opportunistic Mobile Ad-hoc NETworks (MANETs) are a special category of thin and disconnected MANETs wherever knowledge communication exploits isolated contact opportunities among nodes. The authors tend to think about opportunist MANETs wherever nodes move independently haphazardly over a sq. of the plane. Nodes exchange data if they're at a distance...

    Provided By The World

  • White Papers // Oct 2014

    SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management System

    The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of that of a fully trusted key...

    Provided By The World

  • White Papers // Oct 2014

    Cloud Based Structure Approach of Content-as-a-Service for Supplier Impartial of Mobile Gadgets

    These days, mobile gadgets have turn into a commodity, people use several gadgets for various purposes. While people carry only some of their gadgets with them, people still want to access content originating from any device. To overcome this issue, content is often uploaded into a hosting service available in...

    Provided By The World

  • White Papers // Oct 2014

    Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    In this paper, the authors propose redundancy management of Heterogeneous Wireless Sensor Networks (HWSNs), to manage efficient communication in heterogeneous wireless sensor network by utilizing multipath routing to respond the user queries. This paper is to exploit the tradeoff between energy consumption vs. reliability, timeliness, and security to maximize the...

    Provided By The World

  • White Papers // Oct 2014

    Artificial Intelligence in Cyber Defense

    Day-by-day the technology is growing and in proportion to cyber crime is also growing and it becomes very difficult to track the application and to know the loopholes in the application. In order to have a mechanism build in such a way that the application will track all such changes...

    Provided By The World

  • White Papers // Oct 2014

    Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks

    A major challenge in securing wireless applications and services is the inherent vulnerability of radio transmissions to communication jamming Denial-of-Service (DoS) attacks. This vulnerability gains in significance the more one takes the ubiquity of these applications and services for granted and becomes a crucial factor in the context of safety-critical...

    Provided By The World

  • White Papers // Oct 2014

    Secure Mining of Affiliation Runs in Evenly Disseminated Databases

    The authors propose a convention for secure mining of affiliation runs in on a level plane appropriated databases. The current heading convention is that of Kantarcioglu and Clifton. Their convention, in the same way as theirs, is focused around the quick appropriated mining calculation of the researchers, which is an...

    Provided By The World

  • White Papers // Oct 2014

    Access Approach Union for Occasion Preparing Frameworks

    Privacy is a major concern in event processing system, Current event processing systems lack methods to maintain privacy methods on regular event streams in a chain of subsequently applied stream operations. The lack of privacy in event processing system will impact on large scale distributed applications such as logistics applications....

    Provided By The World

  • White Papers // Oct 2014

    Genetic Algorithm to the Development of Artificial Intelligence in Module System

    Artificial Intelligence (AI) is an extremely important role in new technological progress. It represents humanity's life time dream of elevating computers beyond the realm of simple machines for the calculation and processing of data. With the incorporation of artificial intelligence, computers are able to engage in behavior similar to human...

    Provided By The World

  • White Papers // Oct 2014

    A Hybrid Intrusion Detection System for Identification of Anonymous Behavior

    Various approaches available for identify the unauthorized behavior of the incoming nodes like with their trust measures like direct trust, indirect trust and reputation metric, these metrics always maintained globally so network cannot directly depend on it. Servers maintain firewall log data of in and out traffic for intrusion detection...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Data Monitoring Service Over Cloud

    Auditing over cloud data is an interesting research topic in cloud computing. Data owner uploads data fragments after the segmentation of data component to cloud server and auditor monitors data component which is uploaded by the data owner, traditional approach completely depends on third party auditor. In this paper, the...

    Provided By The World

  • White Papers // Oct 2014

    Privacy Preserving Data Storage of Intermediate Data Sets Over Cloud

    Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility over a network. Security should be provided when sharing of cloud data. In this paper, the authors are using ID3 for classification of intermediate data set to store data into cloud. Before...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Filtering Technique over Undesirable Data of OSN User Walls

    Prevention of unwanted and unauthorized data over Internet has become popular mechanism in online social networks. Authorization and control given to the users to prevent those spams either messages or images. In this paper, the authors are proposing an efficient spam filtering mechanism with Naive Bayesian classification by forwarding the...

    Provided By The World

  • White Papers // Oct 2014

    A Secure Self-Destructive Active Storage Framework for Data Confidentiality

    One of the most important services provided by cloud is backend support or data storage area. Obviously it leads to data confidentiality issues while the authors are storing data in remote locations. Self-destructing system gains most importance in recent days of technology. Entire data and its duplicates will become disturbed...

    Provided By The World

  • White Papers // Oct 2014

    A Framework for Attaining Uncertainty and Traceability in WMN

    Anomaly detection is one of the interesting research issues in network security. Identification of anonymous behavior is a complex task to analyze. Anonymity achieves security for users to attack free network services. The situations related to anonymity have been strongly studied in payment based systems such as online cash payment...

    Provided By The World

  • White Papers // Oct 2014

    MIMO-OFDM Downlink Wireless System with Reduced PAPR

    Orthogonal Frequency Division Multiplexing (OFDM) is a multi -carrier transmission method which is most broadly used in the field of communication. One of the main drawbacks of this scheme is Peak to Average Power Ratio (PAPR). There are various methods introduce for the reduction of PAPR in OFDM. However these...

    Provided By The World

  • White Papers // Oct 2014

    Secure Communication Using Modified S-DES with Steganography

    As the communication has developed the need for providing security to the information has become an important issue. Three information hiding techniques that are interlinked are steganography, watermarking and cryptography. In this paper, a novel steganographic method is proposed that is based on the LSB. Here, not only the message...

    Provided By The World

  • White Papers // Oct 2014

    Mobile Sensor and Destination Tracking in Wireless Sensor Networks

    In this paper, the authors study the matter of pursuit signal-emitting mobile targets victimization navigated mobile sensors supported signal reception. Since the mobile target's maneuver is unknown, the mobile device controller utilizes the activity collected by a wireless device network in terms of the mobile target signal's Time Of Arrival...

    Provided By The World

  • White Papers // Oct 2014

    A Novel Classification Approach for Firewall Log Data Analysis

    Firewall log data analysis always an interesting research issue in the field of internet traffic analysis, Even though various approaches available for minimizing internet traffic over heads during network traffic, may not be optimal for all possible samples. In this paper, the authors are proposing an efficient classification approach for...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Secure Data Sharing Between Multi Data Owners

    Cloud computing is one of the interesting research issue now-a-days of recent technology, due to its services, features, low-maintenance and high quality on demand service to cloud users. Multiple data owners can share the data component securely with authentication. In this paper, the authors are proposed the concept digital certificate...

    Provided By The World

  • White Papers // Oct 2014

    Power Saving and Reducing Transmission Delay in WSN Using DMP Scheme

    Scheduling the different types of packets, such as real time and non-real time data packets at sensor nodes in WSN is very important in reducing end-to-end data transmission delay. There are several schemes such as FCFS, DMP Scheme. But these have high processing overhead and long end-to-end data transmission delay....

    Provided By The World

  • White Papers // Oct 2014

    GNU Radio Based BIST for SDR Performance Measurement

    In this paper, the authors investigate on methods to develop Built-In Self-Test (BIST) method for performance measurement of a wideband (20MHz) Software Defined Radio (SDR) with frequency coverage from 50MHz to 2.4GHz. The overall quality of transmission and reception is dictated by various RF system and baseband specifications in wireless...

    Provided By The World

  • White Papers // Oct 2014

    Importance of Load Balancing in Cloud Computing Environment: A Review

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and web services. A cloud consists of several elements such as clients, datacenter and distributed servers. It includes fault tolerance, high availability, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services etc. Central to...

    Provided By The World

  • White Papers // Oct 2014

    128-Bit Advanced Encryption Standard Algorithm Implementation on FPGA

    In any communication, data security plays a vital role and there is a need to protect data from malicious attacks. This paper presents 128 bit pipelining processing of Advanced Encryption Standard (AES). This implementation is compared with previous paper iterative looping to show better efficiency. Encryption and decryption was carried...

    Provided By The World

  • White Papers // Oct 2014

    Security Based Intrusion-Detection System for Ad Hoc Mobile Wireless Networks

    The migration to wireless network from wired network has been a worldwide trend within the past few decades. The quality and quantifiability brought by wireless network created it attainable in many applications. Among all the modern wireless networks, Mobile Ad hoc NETwork (MANET) is one among the foremost important and...

    Provided By The World

  • White Papers // Oct 2014

    Supervision Termination for Multipath Routing with Intervention Detection in Wireless Sensor Networks

    Research problems are to enhance an Intrusion Detection System (IDS) of a clustered HWSN to prolong its lifetime operation in the presence of unreliable and malicious nodes. Also, to address the energy consumption and QoS gain in reliability, delay and security with the goal to maximize the lifetime of a...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks

    Technology has its own way to put forward the next level of research. In the era of Fine dine of IT revolution, where the authors use the Socket layer and its encryption mechanism is a hot cake in the IT Industry, having a good competition to provide the best of...

    Provided By The World

  • White Papers // Oct 2014

    Defending Against Flood Attacks in Distraction Unbiased Networks

    Distraction Unbiased Networks (DUNs) utilize the portability of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DUNs are unprotected to flood attacks in which attackers send as many packets or packet replicas as possible...

    Provided By The World

  • White Papers // Jan 2013

    LDPC Architecture Using Memory Bypassing Scheme

    Error correcting codes insert redundancy into the transmitted data stream so that the receiver can detect and possibly correct errors that occur during transmission. In VLSI design, area of the chip, speed and power consumption are. Its performance is close to Shannon's capacity limits. Inherent parallelism of the message passing...

    Provided By The World

  • White Papers // Jan 2013

    TDOA Computation Using Multicarrier Modulation for Sensor Networks With Efficient Bandwidth

    Locating accurate positions of the nodes is normally required in Sensor Networks which are attempting to locate and track an emitter or sources of signals. GPS is normally used as it provides high accuracy position measurement, but it has its own limitations. In this paper, the authors propose a Bandwidth...

    Provided By The World

  • White Papers // Jan 2013

    Probabilistic Approach for Speech Intelligibility Improvement and Noise Reduction

    Unlike the most speech enhancement algorithms improve speech quality, they may not improve speech intelligibility in noise, this paper focuses on the development of an algorithm that can be optimized for a specific acoustic environment and improve speech intelligibility. Ideal binary time-frequency masking is a signal separation technique that retains...

    Provided By The World

  • White Papers // Jan 2013

    Concept of Storage Virtualization Used in Networks

    Storage Virtualization was the first tutorial of the SNIA (Storage Networking Industrial Association) Education Committee. Development began in summer 2001 and continues to this day as the authors incorporate new material and address new developments in the storage virtualization segment. At the time of writing this booklet, the tutorial team...

    Provided By The World

  • White Papers // Jan 2013

    Concept of Cashing in on the Cache in the Cloud

    Over the past decades, caching has become the key technology used for bridging the performance gap across memory hierarchies via temporal or spatial localities; in particular, the effect is prominent in disk storage systems. Applications that involve heavy I/O activities, which are common in the cloud, probably benefit the most...

    Provided By The World

  • White Papers // Jan 2013

    Wireless Network Based Mines Safety System Using ARM9

    The method of mine safety monitoring system is becoming very important for the safety of the human. The underground environment conditions (such as gas, temperature, humidity and other environmental indicators) will not be constant. This underground environment becomes hazardous and it is difficult for the humans to work in the...

    Provided By The World

  • White Papers // Jan 2013

    Effectiveness and Robustness of Heterogeneous Web Documents

    Now-a-days Internet plays major role in the people daily life such as e-commerce, e-seva etc. Usage of internet is increasing drastically more and more. World Wide Web (WWW) is widely used to publish and access information on the Internet. The web pages in many websites are automatically populated by using...

    Provided By The World

  • White Papers // Jan 2013

    Reconstruction Techniques for Software Architecture

    Architecture is important for any application, migration, feature additions and impact analysis. In the initial design separate the as-designed and as-built architectures. In the architecture recovery bottom-up and top-down approaches are used. The draw back with the bottom-up is it requires domain-specific knowledge and time consuming and largely manual. In...

    Provided By The World

  • White Papers // Jan 2013

    Resource Over Allocation to Improve Energy Efficiency in Real-Time Cloud Computing Data Centers

    Energy efficiency is becoming a very important concern for Cloud Computing environments. These are normally composed of large and power consuming data centers to provide the required elasticity and scalability to their customers. In this context, many efforts have been developed to balance the loads at host level. However, determining...

    Provided By The World

  • White Papers // Jan 2013

    Congestion Avoidance and Mitigation in WSN

    Multipath routing protocol always aims to achieve higher reliability and load balancing in wireless sensor network. In the proposed framework of the project with various assumptions, constraints and dependencies of a heterogeneous wireless sensor network an efficient scheme of multipath congestion has been experimented. In this paper, it is propose...

    Provided By The World

  • White Papers // Jan 2013

    Reliable Communication Over Internet Using VoIP

    Internet telephony services are voice, fax, SMS applications that are transported via the Internet. The steps are originating a VoIP telephone call and media channel setup, digitization, packetization, and transmission as Internet Protocol (IP) packets over a packet-switched network. On the receiving side, similar steps there are many organizations like...

    Provided By The World

  • White Papers // Jan 2013

    RTOS Based Home Automation System Using Android

    With the openness, flexibility and features that Android offers, it has been widely adopted in applications beyond just SmartPhones. This paper presents the design and implementation of a low cost yet compact and secure Android smart phone based home automation system. This design is based on the popular open sourced...

    Provided By The World

  • White Papers // Jan 2013

    Efficient Weighted Pattern Generation Technique With Low Hardware Overhead

    Weighted pseudorandom Built-In Self Test (BIST) schemes have been utilized in order to drive down the number of vectors to achieve complete fault coverage in BIST applications. Weighted sets comprising three weights, namely 0, 1, and 0.5 have been successfully utilized so far for test pattern generation, since they result...

    Provided By The World

  • White Papers // Jan 2013

    Big Data Challenges

    Big Data, an umbrella term for the explosion in the quantity and diversity of high frequency digital data. The Big Data may be logs, mobile-banking transactions, online user generated content such as blog posts and Tweets, online searches, satellite images, etc.- into actionable information requires using computational techniques to unveil...

    Provided By The World

  • White Papers // Jan 2013

    Deploying Virtual Cluster Nodes Distributed Over Different Cloud Providers for On-Demand Resource Provisioning

    Cloud computing technologies can offer important benefits for IT organizations and data centers running MTC applications such as elasticity and rapid provisioning, enabling the organization to increase or decrease its infrastructure capacity within minutes, according to the computing necessities; pay as you go model, allowing organizations to purchase and pay...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Routing Approach to Provide Security in Wireless Networks

    Wireless ad hoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless ad hoc environment is an important concern. In this paper, the authors propose to use shared cryptography to secure message communication in ad hoc network. In...

    Provided By The World

  • White Papers // Jan 2013

    Co-Operative Distributed Intrusion Detection in Wireless Ad-Hoc Network

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks...

    Provided By The World

  • White Papers // Jan 2013

    Video Signal Transmission Through DWDM Network

    In this paper, the authors proposed a procedure, which determines where the interruption of the quality of transmission starts. Based on the algorithm, simulations of transmission for specific values are executed. The analysis of the results showed how the BER and Q-factor change depending on the length of the fiber,...

    Provided By The World

  • White Papers // Jan 2013

    Parameter Estimation of Price-Demand Model for Cloud Data Services

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By The World

  • White Papers // Jan 2013

    Resistant Protocol to Resist Large-Scale Online Password Guessing Attacks

    Passwords, passphrases and security codes are used in virtually every interaction between users and information systems. Unfortunately, with such a central role in security, easily guessed passwords are often the weakest link. They grant attackers access to system resources; and bring them significantly closer to being able to access other...

    Provided By The World

  • White Papers // Jan 2013

    Anonymous Processing of Query in Road Networks

    The increasing availability of location aware mobile devices has given rise to a flurry of Location-Based Services (LBS). Due to the nature of spatial queries, an LBS needs the user position in order to process the requests. On the other hand, revealing exact user locations to (potentially untrusted) LBS may...

    Provided By The World

  • White Papers // Jan 2013

    Optimisation of the VLSI Architecture in Wireless Sensor Network

    Optimisation of VLSI architecture in Wireless Sensor Network (WSN) scheme for fusion centre to detect the faults of sensor nodes via Efficient Collaborative Sensor Fault Detection (ECSFD), these scheme identifies the sensor node fault percentage and its efficiency of the particular sensor node. In real world most of the applications...

    Provided By The World

  • White Papers // Jan 2013

    Reduction of Latency in an Asynchronous Communication System With Error Correction Capabilities

    This paper introduces a new family of Error-Correction Unordered (ECU) codes for global communication, called zero - sum. It is the combination of delay insensitive codes and fault tolerance of error correcting codes. Two important feature of this code are that they are systematic and weighted. For this code, a...

    Provided By The World

  • White Papers // Jan 2013

    Autonomic Computing Using Clouds

    Cloud computing offerings today that are suitable to host enterprise architectures. But while these offerings provide clear benefit to corporations by providing capabilities complementary to what they have, the fact that they can help to elastically scale enterprise architectures should not be understood to also mean that simply scaling in...

    Provided By The World

  • White Papers // Jan 2013

    Reducing Multipath Effects in Indoor Channel for Acquisition of GPS Based Pseudolite Signals

    The Global Positioning System (GPS) is an extremely mature technique in the navigation and positioning field. However, there are still some limits in some aspects and for some special applications. The main limitation of the GPS use indoors are the low signal power and the presence of multi-paths, which may...

    Provided By The World

  • White Papers // Jan 2013

    Performance Evaluation of Basic Compression Technique for Wireless Text Data

    The continuous growth of mobile, desktop and wired and wireless digital communication technologies has made the extensive use of the text data unavoidable. The basic characteristics of text data like transmission rate, bandwidth, redundancy, bulk capacity and co-relation among text data makes basic compression algorithms mandatory. The research exploration in...

    Provided By The World

  • White Papers // Jan 2013

    Web Based Audio/video Playback System Through Text Based SMS Using GSM and S3C2440

    In recent years, data service has been gaining popularity in embedded system. Most of the audio/video devices today consists of either a internal memory or consists of an interface in the form of I/O device and are being controlled by legacy Infra Red (IR) based remote controllers which has limited...

    Provided By The World

  • White Papers // Jan 2013

    Lifetime Analysis of MANET in Presence of Selfish Nodes

    The MANETs are self-configuring and decentralized networks without having a fixed infrastructure. In such a network, each node acts as an end-system as well as a relay node (or router). Most of the routing algorithms designed for a MANET are based on the assumption that every node in the network...

    Provided By The World

  • White Papers // Jan 2013

    A Novel Approach on Applications, Research Challenges and Mining for Mobile Crowdsensing

    A new phase of the information society - The Internet of things in which the web will not only link computers but potentially every object created by mankind. An emerging category of devices at the edge of the Internet are consumer centric mobile sensing and computing devices, such as smart...

    Provided By The World

  • White Papers // Jan 2013

    Trusted Dissemation of Data in Opportunistic Network

    With the rapid evolution of network diversity and the development of short range wireless communication technologies, a new network known as opportunistic networks emerges, this kind of network falls into two fields-Mobile Ad-hoc NETwork (MANET) and Delay Tolerant Network (DTN). Opportunistic network thus comprises the methods and features of Delay...

    Provided By The World

  • White Papers // Jan 2013

    Adoption of Cloud Computing in Distance Learning

    The use of distance courses in learning is growing exponentially. To better support faculty and students for teaching and learning, distance learning programs need to constantly innovate and optimize their IT infrastructures. The new IT paradigm called "Cloud computing" has the potential to transform the way that IT resources are...

    Provided By The World

  • White Papers // Jan 2013

    Development of Communication Protocol Conversion Equipment Based on Embedded MCU and RTX51

    Using the embedded multi-MCU and high-speed dual-port RAM data sharing technology, communication protocol conversion equipment based on embedded multi-MCU and real-time multitasking operating system RTX51 has been researched and developed, which adopts RS232 or RS485 communication interfaces for lower machines such as data acquisition I/O modules, smart intelligent instruments and...

    Provided By The World

  • White Papers // Jan 2013

    Analysis of Cluster Based Routing Protocol for Mobile Wireless Sensor Network

    Technological advances in communications and computation have enabled the development of low-cost, low-power, small in size, and multifunctional sensor nodes in a wireless sensor network. Since the radio transmission and reception consumes a lot of energy, one of the important issues in Wireless Sensor Network (WSN) is the inherent limited...

    Provided By The World

  • White Papers // Jan 2013

    Augmentation Data Security Aspects of Cloud Computing

    Cloud computing environments consisting of different modules that handle the security and trust issues of key components. One of the modules is responsible for authentication and identity management. This paper focuses on the issues related to the data security aspect of cloud computing. This paper surveys recent research related to...

    Provided By The World

  • White Papers // Jan 2013

    An Energy-Efficient Congestion Based Clustering Protocol for Wireless Sensor Network Using Round Robin Scheduling Technique

    A wireless sensor networks consists of spatially distributed autonomous sensors nodes called motes. Clustering is an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms consumes much time in setup phase and they hardly consider the congestion problem at the base station and inter-cluster communication...

    Provided By The World

  • White Papers // Jun 2012

    Delay Based End to End Internet Congestion Control Using Natural Logic

    The problem of network congestion management is a major issue and a high priority, especially given the growing size, demand, and speed (bandwidth) of the increasingly integrated services networks. Delay-based algorithms become the preferred approach for end-to-end congestion control as networks scale up in capacity. Their advantage is small at...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Resource Allocation Protocol for Multimedia Wireless Networks

    In the next generation high-speed wireless networks are expected to support multimedia applications (video, voice, and data). As such, it is important that these networks provide Quality-of-Service (QoS) guarantees. Unlike wired networks, communication entities in wireless networks change their connectivity via handoff when user moves from one cell to another....

    Provided By The World

  • White Papers // Jan 2013

    Implementation of Light Weight Internet Controlled Web Server in Embedded Systems

    This paper presents an implementation of a plat form independent embedded web server and its integration into a network of wireless sensor nodes. This allows the user to monitor the operation of the WSN remotely, to periodically download the sensed data, and to change the operation mode of the network....

    Provided By The World

  • White Papers // Jan 2013

    Security and Congestion Control Schema Using Randomized Dispersive Routes in Heterogeneous Networks

    Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbors. Key management is the critical...

    Provided By The World

  • White Papers // Jan 2013

    Secure Data Accumulation by Ant Agents in Wireless Sensor Network Using Randomized Dispersive Routing Mechanism

    In this paper, the authors discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP (Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant...

    Provided By The World