The World

Displaying 1-40 of 403 results

  • White Papers // Dec 2014

    Analysis of Wavelet Families on Audio Steganography Using AES

    With the growing trends in wireless network in this modern era, more and more multimedia data are generated and transmitted. So the effective ways to ensure their security are increased. This can be achieved by implementing steganography techniques. Audio steganography is more challenging compared to image or video steganography. There...

    Provided By The World

  • White Papers // Dec 2014

    HEFT Based Cloud Auto-Scaling Algorithm with Budget Constraints

    Cloud computing now-a-days is playing major role in processing enterprise and personal applications. Its dynamic scalability enables users to scale up/down underlying infrastructure in response to dynamic performance behaviors. This benefit provides the basis for solving performance-resource mapping problem when deploying an application on cloud. Many researches on exploring efficient...

    Provided By The World

  • White Papers // Dec 2014

    Performance Analysis of Security Protocol for Advanced Metering Infrastructure in Smart Grid

    The smart grid is a network of computers and power infrastructures that monitor and manage energy usage. This paper aims to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security. A security protocol, Integrated Authentication...

    Provided By The World

  • White Papers // Dec 2014

    A Survey of Routing Attacks and Detection Schemes in MANET

    The insecurity of the wireless links, power and energy constraints, poor physical protection of nodes in a hostile environment, and the vulnerability of statically configured security schemes poses challenges for routing and secure data transfer in wireless networks. No part or component of the network is dedicated to support specific...

    Provided By The World

  • White Papers // Dec 2014

    Survey on Minimizing Energy Consumption in Mobile Adhoc Networks

    Mobile ad hoc network consists of nodes that move arbitrarily. It leads to dynamic topologies. Power failure of a mobile node not only affects the node itself but also its ability to forward packet on behalf of others and the overall network life time. For this reason many research efforts...

    Provided By The World

  • White Papers // Dec 2014

    Analysis on Environmental Decision in Artificial Intelligence System for Multi Disciplinary Applications

    An effective protection of the people environment is largely dependent on the quality of the available information used to make an appropriate decision. Problems dissent when the quantities of forthcoming collection are huge and non homogenous which are future from some antithetical disciplines or sources and their propertied could not...

    Provided By The World

  • White Papers // Nov 2014

    Optimal Contention Window Selection in IEEE 802.11 MAC Protocol for Better Performance of Wireless Networks

    In this paper, the authors investigate the impact of network size and contention window on the performance of the IEEE 802.11 MAC protocol. The performance of any network needs to be evaluated on certain criteria, these criteria then decide the basis of performance of any system. Study on wireless networks'...

    Provided By The World

  • White Papers // Nov 2014

    E-Mail Fusion with Graph Based Approach Stipulating OPass Security

    Most users are satiated with separately logging in into their multiple accounts, and hence end up spending a large amount of time in accessing them. It becomes a tedious task to remember all email id's and passwords for all their accounts. In this paper, the authors present a single framework...

    Provided By The World

  • White Papers // Nov 2014

    Quick Predictive Handover to Ensure Optimal QoS in Heterogeneous Mobile Network Platform

    Recently these day, mobile IPv6 based mobile networks are increasing with the widespread popularity of cutting edge wireless internet connectivity. As Internet users are moving away from fixed connections to mobile connections in dealing with their day-to-day activities. In order to remain connected to the Internet while on the go,...

    Provided By The World

  • White Papers // Oct 2014

    Privacy Preserving Data Storage of Intermediate Data Sets Over Cloud

    Cloud computing relies on sharing of resources to achieve coherence and economies of scale, similar to a utility over a network. Security should be provided when sharing of cloud data. In this paper, the authors are using ID3 for classification of intermediate data set to store data into cloud. Before...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Filtering Technique over Undesirable Data of OSN User Walls

    Prevention of unwanted and unauthorized data over Internet has become popular mechanism in online social networks. Authorization and control given to the users to prevent those spams either messages or images. In this paper, the authors are proposing an efficient spam filtering mechanism with Naive Bayesian classification by forwarding the...

    Provided By The World

  • White Papers // Oct 2014

    A Secure Self-Destructive Active Storage Framework for Data Confidentiality

    One of the most important services provided by cloud is backend support or data storage area. Obviously it leads to data confidentiality issues while the authors are storing data in remote locations. Self-destructing system gains most importance in recent days of technology. Entire data and its duplicates will become disturbed...

    Provided By The World

  • White Papers // Oct 2014

    A Framework for Attaining Uncertainty and Traceability in WMN

    Anomaly detection is one of the interesting research issues in network security. Identification of anonymous behavior is a complex task to analyze. Anonymity achieves security for users to attack free network services. The situations related to anonymity have been strongly studied in payment based systems such as online cash payment...

    Provided By The World

  • White Papers // Oct 2014

    MIMO-OFDM Downlink Wireless System with Reduced PAPR

    Orthogonal Frequency Division Multiplexing (OFDM) is a multi -carrier transmission method which is most broadly used in the field of communication. One of the main drawbacks of this scheme is Peak to Average Power Ratio (PAPR). There are various methods introduce for the reduction of PAPR in OFDM. However these...

    Provided By The World

  • White Papers // Oct 2014

    Secure Communication Using Modified S-DES with Steganography

    As the communication has developed the need for providing security to the information has become an important issue. Three information hiding techniques that are interlinked are steganography, watermarking and cryptography. In this paper, a novel steganographic method is proposed that is based on the LSB. Here, not only the message...

    Provided By The World

  • White Papers // Oct 2014

    Mobile Sensor and Destination Tracking in Wireless Sensor Networks

    In this paper, the authors study the matter of pursuit signal-emitting mobile targets victimization navigated mobile sensors supported signal reception. Since the mobile target's maneuver is unknown, the mobile device controller utilizes the activity collected by a wireless device network in terms of the mobile target signal's Time Of Arrival...

    Provided By The World

  • White Papers // Oct 2014

    A Novel Classification Approach for Firewall Log Data Analysis

    Firewall log data analysis always an interesting research issue in the field of internet traffic analysis, Even though various approaches available for minimizing internet traffic over heads during network traffic, may not be optimal for all possible samples. In this paper, the authors are proposing an efficient classification approach for...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Secure Data Sharing Between Multi Data Owners

    Cloud computing is one of the interesting research issue now-a-days of recent technology, due to its services, features, low-maintenance and high quality on demand service to cloud users. Multiple data owners can share the data component securely with authentication. In this paper, the authors are proposed the concept digital certificate...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Privacy Preserving Data Clustering Over Distributed Networks

    In distributed networks or open environments nodes communicates with each other openly for transmission of data, there is a rapid research going on secure mining. Privacy preserving over data mining in distributed networks is still an important research issue in the field of knowledge and data engineering or community based...

    Provided By The World

  • White Papers // Oct 2014

    A Novel Intrusion Detection System with Classification and Signature Approach

    Cloud computing is a process that provides the easy usage on request network browsing to a distributed pool of dynamic settings of computing resources. This cloud scheme increases the availability and it consists of five particular features, three delivery methods and four hosting models. Identifying and preventing unauthorized access (intrusion...

    Provided By The World

  • White Papers // Oct 2014

    A Double Layer Security Scheme for Conserving Private Data in Cloud Services

    In cloud services data security is a major problem. In these services intruders attack on keys and eventually capture the content in the network. So the authors introduced a novel protocol that reduces data leakage attacks. They introduced a double layer protection that used symmetric key cryptographic techniques secure data....

    Provided By The World

  • White Papers // Oct 2014

    Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control

    In view of the invasive web traffic, this paper propose a distributed traffic management framework, in which routers area unit deployed with intelligent rate controllers to tackle the traffic mass. in contrast to different express control protocols that ought to estimate network parameters (e.g., link latency, bottleneck information measure, packet...

    Provided By The World

  • White Papers // Oct 2014

    Secure Sharing in Distributed Information Management Applications

    Interaction between entities that may not trust each other is now commonplace on the Internet. This paper focuses on the specific problem of sharing information between distrusting parties. Previous work in this area shows that privacy and utility can co-exist, but often do not provide strong assurances of one or...

    Provided By The World

  • White Papers // Oct 2014

    Facilitating Indirect Mutual Trust for Cloud Storage Systems

    In this digital age, organizations produce a large amount of sensitive data including personal information such as financial data. The local management of such humongous amount of data is problematic and costly due to the requirements of high storage capacity and experienced personnel. Storage-as-a-Service (SaaS) offered by Cloud Service Providers...

    Provided By The World

  • White Papers // Oct 2014

    Opportunistic MANETs: Quality Will Frame for Low Transmission Power

    Opportunistic Mobile Ad-hoc NETworks (MANETs) are a special category of thin and disconnected MANETs wherever knowledge communication exploits isolated contact opportunities among nodes. The authors tend to think about opportunist MANETs wherever nodes move independently haphazardly over a sq. of the plane. Nodes exchange data if they're at a distance...

    Provided By The World

  • White Papers // Oct 2014

    SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management System

    The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of that of a fully trusted key...

    Provided By The World

  • White Papers // Oct 2014

    Cloud Based Structure Approach of Content-as-a-Service for Supplier Impartial of Mobile Gadgets

    These days, mobile gadgets have turn into a commodity, people use several gadgets for various purposes. While people carry only some of their gadgets with them, people still want to access content originating from any device. To overcome this issue, content is often uploaded into a hosting service available in...

    Provided By The World

  • White Papers // Oct 2014

    Repetition Administration of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks

    In this paper, the authors propose redundancy management of Heterogeneous Wireless Sensor Networks (HWSNs), to manage efficient communication in heterogeneous wireless sensor network by utilizing multipath routing to respond the user queries. This paper is to exploit the tradeoff between energy consumption vs. reliability, timeliness, and security to maximize the...

    Provided By The World

  • White Papers // Oct 2014

    Artificial Intelligence in Cyber Defense

    Day-by-day the technology is growing and in proportion to cyber crime is also growing and it becomes very difficult to track the application and to know the loopholes in the application. In order to have a mechanism build in such a way that the application will track all such changes...

    Provided By The World

  • White Papers // Oct 2014

    Novel Techniques for Transmissions to Communication Jamming Denial-of-Service Attacks

    A major challenge in securing wireless applications and services is the inherent vulnerability of radio transmissions to communication jamming Denial-of-Service (DoS) attacks. This vulnerability gains in significance the more one takes the ubiquity of these applications and services for granted and becomes a crucial factor in the context of safety-critical...

    Provided By The World

  • White Papers // Oct 2014

    Secure Mining of Affiliation Runs in Evenly Disseminated Databases

    The authors propose a convention for secure mining of affiliation runs in on a level plane appropriated databases. The current heading convention is that of Kantarcioglu and Clifton. Their convention, in the same way as theirs, is focused around the quick appropriated mining calculation of the researchers, which is an...

    Provided By The World

  • White Papers // Oct 2014

    Access Approach Union for Occasion Preparing Frameworks

    Privacy is a major concern in event processing system, Current event processing systems lack methods to maintain privacy methods on regular event streams in a chain of subsequently applied stream operations. The lack of privacy in event processing system will impact on large scale distributed applications such as logistics applications....

    Provided By The World

  • White Papers // Oct 2014

    Genetic Algorithm to the Development of Artificial Intelligence in Module System

    Artificial Intelligence (AI) is an extremely important role in new technological progress. It represents humanity's life time dream of elevating computers beyond the realm of simple machines for the calculation and processing of data. With the incorporation of artificial intelligence, computers are able to engage in behavior similar to human...

    Provided By The World

  • White Papers // Oct 2014

    A Hybrid Intrusion Detection System for Identification of Anonymous Behavior

    Various approaches available for identify the unauthorized behavior of the incoming nodes like with their trust measures like direct trust, indirect trust and reputation metric, these metrics always maintained globally so network cannot directly depend on it. Servers maintain firewall log data of in and out traffic for intrusion detection...

    Provided By The World

  • White Papers // Oct 2014

    An Empirical Model of Data Monitoring Service Over Cloud

    Auditing over cloud data is an interesting research topic in cloud computing. Data owner uploads data fragments after the segmentation of data component to cloud server and auditor monitors data component which is uploaded by the data owner, traditional approach completely depends on third party auditor. In this paper, the...

    Provided By The World

  • White Papers // Oct 2014

    Power Saving and Reducing Transmission Delay in WSN Using DMP Scheme

    Scheduling the different types of packets, such as real time and non-real time data packets at sensor nodes in WSN is very important in reducing end-to-end data transmission delay. There are several schemes such as FCFS, DMP Scheme. But these have high processing overhead and long end-to-end data transmission delay....

    Provided By The World

  • White Papers // Oct 2014

    GNU Radio Based BIST for SDR Performance Measurement

    In this paper, the authors investigate on methods to develop Built-In Self-Test (BIST) method for performance measurement of a wideband (20MHz) Software Defined Radio (SDR) with frequency coverage from 50MHz to 2.4GHz. The overall quality of transmission and reception is dictated by various RF system and baseband specifications in wireless...

    Provided By The World

  • White Papers // Oct 2014

    Importance of Load Balancing in Cloud Computing Environment: A Review

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and web services. A cloud consists of several elements such as clients, datacenter and distributed servers. It includes fault tolerance, high availability, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services etc. Central to...

    Provided By The World

  • White Papers // Oct 2014

    128-Bit Advanced Encryption Standard Algorithm Implementation on FPGA

    In any communication, data security plays a vital role and there is a need to protect data from malicious attacks. This paper presents 128 bit pipelining processing of Advanced Encryption Standard (AES). This implementation is compared with previous paper iterative looping to show better efficiency. Encryption and decryption was carried...

    Provided By The World

  • White Papers // Oct 2014

    Security Based Intrusion-Detection System for Ad Hoc Mobile Wireless Networks

    The migration to wireless network from wired network has been a worldwide trend within the past few decades. The quality and quantifiability brought by wireless network created it attainable in many applications. Among all the modern wireless networks, Mobile Ad hoc NETwork (MANET) is one among the foremost important and...

    Provided By The World

  • White Papers // Apr 2014

    The Searching of Relevant Query

    Many internet users are increasingly search complex task-oriented goals on the internet, for example making travel arrangements and administrate finances or planning purchases. They are usually breaking down the tasks into some codependent steps and issue multiple queries around these steps repeatedly after long time. To give a good support...

    Provided By The World

  • White Papers // Apr 2014

    Data Accountability in Cloud Using CIA Framework

    The major feature of cloud service is that the user's data is processed on remote machines. In this scenario data owner does not know, on which machine his data will get processed. Due to this users fears of losing control of their own data and there are chances that the...

    Provided By The World

  • White Papers // May 2014

    Ranking Spatial Data by Quality Preferences Using Spatial Techniques

    The quality of features of an object is ranked based on the spatial preference query. For example, using a Landed property agency database of flats for lease, a customer may want to rank the flats with respect to the correctness of their location, defined after aggregating the qualities of other...

    Provided By The World

  • White Papers // May 2014

    Survey on Students' Academic Failure and Dropout using Data Mining Techniques

    Educational data mining is in the habit of learn the data available in the field of education and show up the hidden knowledge from it. Classification methods like decision trees, machine learning, rule mining, etc can be applied on the educational data for forecasting the student's behavior, performance of them...

    Provided By The World

  • White Papers // May 2014

    Testing Cloud Application System Resiliency by Wrecking the System

    When application architecture moves to the public cloud, failures and outages are inevitable. Rather than panicking when failures strike at the worst time, one should prepare for failures in good times. The best way to tackle failure is to fail often. This cycle of failing instances deliberately and then testing...

    Provided By The World

  • White Papers // Apr 2014

    A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining

    Frequent pattern (itemset) mining plays an important role in association rule mining. The apriori & FP-growth algorithms are the most famous algorithms which can be used for frequent pattern mining. This paper presents the survey of various frequent pattern mining and rule mining algorithm which can be applied to crime...

    Provided By The World

  • White Papers // Feb 2014

    Cloud Mobile Social T.V for Adaptive Video Streaming

    Smartphone provides most of the application that a pc system gives. Easy maintenance is the main attraction of android smart phones. In this paper, articulate features for MObile-social tV system using Cloud computing (CloudMoV) is proposed. In common the problem while using the smart phones is the large power consumption....

    Provided By The World

  • White Papers // Oct 2013

    A Comparative Study of B.A.T.M.A.N. and OLSR Routing Protocols for MANETs

    Mobile ad hoc networks are capable of making dynamic changes in any topology. The characteristic which differentiates MANETs from other networks is that it is capable of changing its location. The results of the surveys over the last 5 years have shown that it can overcome congestion and communication barrier...

    Provided By The World

  • White Papers // Oct 2013

    A Concept Paper on Performance Trade-offs of Security Algorithms for Adhoc Networks

    Data security is an important issue in computer networks and cryptographic algorithms are essential parts in network security. Ad Hoc networks are much vulnerable to be attacked because of its characteristics. In this paper, the authors have tried to study the problem of security in ad hoc networks. The comparative...

    Provided By The World

  • White Papers // Sep 2013

    E-Business by PickMe - An Android Based Mobile App as a Solution to Transportation Logistic

    Any country's transportation system doesn't rely only on new roads or maintenance of infrastructure, it also depends on implementation of technology, usage of sensors, smart microchips, and communication devices that collect and disseminate information about the functioning of the transportation system. In this paper, the authors' present and Android based...

    Provided By The World

  • White Papers // Sep 2013

    A Brief Review of Antenna Technologies for Various Wireless Communication Applications

    In this paper, the authors present a brief review of the various types of smart antennas & are the most efficient leading innovation for maximum capacity and improved quality and coverage. A systematic comparison of the performance of different types of smart antennas for beam-forming has been extensively studied in...

    Provided By The World

  • White Papers // Oct 2013

    Design and Implementation of Hybrid Routing Algorithm for VANET

    Vehicular Ad-hoc NETworks (VANETs) form when vehicles are equipped with devices capable of short-range wireless communication. Precise reproduction of VANETs is a demanding task; require both a vehicle mobility mould and a network simulator. This paper gives the close look of VANET and the new techniques by which the concert...

    Provided By The World

  • White Papers // Aug 2013

    Sevice Implemenation Using MPLS VPN in IPv6

    Internet Protocol version 6 (IPv6) is an enhanced version of Internet Protocol version 4 (IPv4) with IPv6 having 64 bit address whereas IPv4 having 32 bit address. Service implementation is done for providing different services to the customer. Detailed layer3 virtual private network implementation in internet protocol version 6 is...

    Provided By The World

  • White Papers // Jun 2013

    Scalability with Ring Topology in QoS Analysis of Mobile Ad-Hoc Network

    Wireless ad-hoc networking is core technology in modern communication system. Difference in terms of scalability by varying number of nodes (7 & 15) and ring topology is studied by using Network Simulator-2 (NS-2) software for QoS service analysis of MANET. To analyze the effect of scalability on QoS analysis, the...

    Provided By The World

  • White Papers // Feb 2013

    A Pipelined Implementation of OFDM for Wireless LAN

    The Orthogonal Frequency Division Multiplexing (OFDM) is a parallel transmission scheme. It has attained the high data rate by splitting the data stream into a number of low-rate Sub-Carriers (SC) instead of utilizing one carrier at a high rate. OFDM have been around 1960s. This technique is mainly used in...

    Provided By The World

  • White Papers // Feb 2013

    Design and Characterization of E-Shape Microstrip Patch Antenna for Wireless Communication

    The area of microstrip antennas has seen some inventive work in recent years and is one of the most dynamic fields of antenna theory. The ever increasing need for mobile communication and the emergence of newer technologies require an efficient design of antenna of smaller size for wider frequency range...

    Provided By The World

  • White Papers // Feb 2013

    Implementation of Integrated DC-DC Converter for Cellular Phones

    In this paper, the authors demonstrate an integrated small size buck DC-DC converter for cellular phones. At nominal conditions, the converter produces a 3.7-V output from a 12-V input. Both open loop and closed loop systems are introduced. A simple technique to reduce the ripple is also presented. A converter...

    Provided By The World

  • White Papers // May 2014

    Distribution of Updated Data in Wireless Broadcasting Environment

    Wireless data broadcast is a popular data dissemination method in mobile computing environments because of its capability of concurrently disseminating data to multiple users. When an application involves wireless mobile clients that run multiple-operation transactions and dynamically update the server database, those updates have to be appear in the next...

    Provided By The World

  • White Papers // Mar 2014

    A Review of Cross-Layered Approach in Wireless Sensor Networks

    Sensor networks offer many attractive low cost solutions to monitor environmental conditions. In almost all of its applications there is no existing infrastructure for communication. Therefore, it is crucial for sensor nodes to survive on small sources of energy and communicate using a wireless channel. For this the communication need...

    Provided By The World

  • White Papers // Mar 2014

    A Cross-Layer Implementation and Efficiency Improvement Using Cross-Layer Detection and Allocation Algorithm

    The IEEE 802.15.4 standard is designed to achieve low-power transmissions in low-rate and short distance Wireless Personal Area Networks (WPANs). In IEEE 802.15.4 CSMA/CA protocol is used. This protocol cannot avoid the hidden node collision. The hidden node collision is called as Hidden Device Problem (HDP). Due to the hidden...

    Provided By The World

  • White Papers // Mar 2014

    Multimodal Biometrics Using Mobile Phone

    Today with greater advancement in mobile phone technologies capable of recognizing a biometric feature for recognizing an individual, the authors' proposed model is based on multimodal biometrics using face and fingerprint. Multimodal gives a greater accuracy and security when compared to unimodal biometrics. The match score is a measure of...

    Provided By The World

  • White Papers // Feb 2014

    Web Based Security Analysis of Opass Authentication Schemes Using Mobile Application

    Graphical password, text password are authentication of users on websites because of its simplicity and easy. User's passwords are easy to hack by using different malicious programs and threats. First, Users select easy to remember password because now-a-days they using many accounts on different websites. To login to websites they...

    Provided By The World

  • White Papers // Feb 2014

    Access Policy and Security of Multiple Entry Points with VPNs

    The current event processing system worked on the consolidation of one hop to other single hop. The present system having lack of security in multi-hop processing. This is the problem in large scale distribution applications in multiple security domains. This paper presents an approach that allows the load sharing, high...

    Provided By The World

  • White Papers // Feb 2014

    Border Security Using WINS

    Wireless Integrated Network Sensors (WINS) now provide a new monitoring and control capability for monitoring the borders of the country. Using this concept, the authors can easily identify a stranger or some terrorists entering the border. The border area is divided into number of nodes. Each node is in contact...

    Provided By The World

  • White Papers // Feb 2014

    A Contemporary of Routing Protocol in Wireless Sensor Networks (WSNs)

    The survey conducted recently reckons that by the year 2010 more than 10 billion wireless sensors have been deployed for various applications, as diverse as environmental monitoring, agricultural monitoring, machine health monitoring, surveillance, and medical monitoring. These networks connect the physical world with the digital world and provide the user...

    Provided By The World

  • White Papers // Feb 2014

    New Design Strategy of a MAC Protocol Algorithm for Wireless Networks for Better Throughput

    IEEE 802.11 is the basic standard for wireless networks in ad hoc mode. Wireless terminals are generally connected by batteries which provide limited transmission power and limited amount of energy. In this paper, the authors design a new MAC protocol algorithm for better spatial reuse, better throughput and a smaller...

    Provided By The World

  • White Papers // Feb 2014

    Li-Fi(Light Fidelity): The Next Generation of Wireless Network

    It was first demonstrated at a TED talk in 2011 by the researcher, is a new standard developed to transport data through light beams at speeds ranging theoretically from 800 to 1300 mbps. Li-Fi or light fidelity refers to 5G visible light communication systems using light from Light Emitting Diodes...

    Provided By The World

  • White Papers // Feb 2014

    3D Password Authentication

    Users now-a-days are provided with major password stereotypes such as textual passwords, biometric scanning, tokens or cards (such as an ATM) etc. Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionary or...

    Provided By The World

  • White Papers // Feb 2014

    Contemporary Attacks and Applications on Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) are an active research area in computer science and telecommunication with crucial pool of knowledge not only for underlying networking applications, but also for security associated configurations. The surfacing of sensor networks as one of the dominant technology trends in the coming decades has posed numerous...

    Provided By The World

  • White Papers // Feb 2014

    Malwise System for Packed and Polymorphic Malware

    Signature based malware detection systems have been a much used response to the pervasive problem of malware. Identification of malware variants is essential to a detection system and is made possible by identifying invariant characteristics in related samples. To classify the packed and polymorphic malware, this paper proposes a novel...

    Provided By The World

  • White Papers // Feb 2014

    Advancements in Smart Grid Technology Using Fi-Wi Architecture

    In this paper, the authors provide a detailed study regarding the application of Fi-Wi architecture in smart grids. Fiber-wireless technology, known in short as \"Fi-Wi\", is a combination of optical fiber-based network and wireless network. Fi-Wi has recently come forward as one of the emerging future network technologies. The smart...

    Provided By The World

  • White Papers // Feb 2014

    KRS Techniques in Testing

    In this paper, the authors deal with the introducing of new unit code testing technique called KRS unit code test, and new test approach called KRS approach, the combination of KRS unit code test and KRS approach is called KRS technique of testing. The paper is introducing a new way...

    Provided By The World

  • White Papers // Feb 2014

    Prevent Jamming Attacks in Wireless Networks Using Cryptographic Primitives

    Jamming is typically referred as an intentional interference attack which is left due to the open nature of u medium. Due to their nature, wireless sensor network are probably the category of wireless networks most vulnerable to radio channel jamming. This intentional interference with wireless transmission launch pad for mounting...

    Provided By The World

  • White Papers // Feb 2014

    Security Challenges of Routing Protocols in MANETS: An Overview

    Mobile Ad hoc NETworks (MANETS) are a set of mobile nodes that form temporary network without aid of any existing network infrastructure or central access point. The nodes communicate with each other by interchange of packets, which for those nodes not in wireless range goes hop by hop. So lack...

    Provided By The World

  • White Papers // Feb 2014

    Robust Methodology for Prolonging Lifespan of Wireless Sensor Networks

    Maximizing the lifetime of Wireless Sensor Networks (WSNs) is a challenging problem. Although some methods exist to address the problem in homogenous WSNs, research on this problem in heterogeneous WSNs have progressed at a slow pace. Here, the authors propose an ACO-based approach that can maximize the lifetime of heterogeneous...

    Provided By The World

  • White Papers // Feb 2014

    Wibree Using Digital Radio Technology

    Now-a-days, the wireless technologies are more in use and are widely evolving. Some of the technologies now in use are Wi-Fi, WiMax, Zigbee, and Bluetooth. Wibree is the first open wireless technology to specifically target connectivity between mobile devices such as Smartphone or PCs and small, battery-powered devices such as...

    Provided By The World

  • White Papers // Feb 2014

    Uniform Clustered Energy Efficient Protocol for WSN

    Wireless sensor nodes are highly energy constrained devices. Energy is a most important in wireless sensor network to improve the lifetime of the senor, having so many methods in that clustering provides an effective method to extend the network life time. Some of the vital issues that need to be...

    Provided By The World

  • White Papers // Feb 2014

    Robust and an Energy Efficient AOMDV Protocol for Improved Quality of Service (QoS) in MANET

    The authors focus on drawbacks of Ad hoc On-demand Multipath Distance Vector (AOMDV) protocol. This protocol has two major drawbacks: the relief routes are not maintained. Source node does not know if a given relief route is still valid when it is needed. The use of an obsolete path leads...

    Provided By The World

  • White Papers // Feb 2014

    Mobile Ad-Hoc Networks in the Battlefield with 4G Support

    Information is power, nowhere be this truer than on the battlefield, where the ability to talk clearly and rapidly pass on information spells the difference between survival and death? This technology adopts Wireless technology on the platform of permanent networks, advanced antennae technologies and more advanced wireless security technologies. Next...

    Provided By The World

  • White Papers // Feb 2014

    Content Filtering on Social Networking Sites

    A social networking service is a platform to build social networks or social relations among people. A social network service consists of a representation of each user (often a profile), the user's social links, and a variety of additional services. Most social network services are web-based and provide means for...

    Provided By The World