The World

Displaying 1-40 of 403 results

  • White Papers // Dec 2014

    Analysis of Wavelet Families on Audio Steganography Using AES

    With the growing trends in wireless network in this modern era, more and more multimedia data are generated and transmitted. So the effective ways to ensure their security are increased. This can be achieved by implementing steganography techniques. Audio steganography is more challenging compared to image or video steganography. There...

    Provided By The World

  • White Papers // Dec 2014

    HEFT Based Cloud Auto-Scaling Algorithm with Budget Constraints

    Cloud computing now-a-days is playing major role in processing enterprise and personal applications. Its dynamic scalability enables users to scale up/down underlying infrastructure in response to dynamic performance behaviors. This benefit provides the basis for solving performance-resource mapping problem when deploying an application on cloud. Many researches on exploring efficient...

    Provided By The World

  • White Papers // Dec 2014

    A Survey of Routing Attacks and Detection Schemes in MANET

    The insecurity of the wireless links, power and energy constraints, poor physical protection of nodes in a hostile environment, and the vulnerability of statically configured security schemes poses challenges for routing and secure data transfer in wireless networks. No part or component of the network is dedicated to support specific...

    Provided By The World

  • White Papers // Dec 2014

    Performance Analysis of Security Protocol for Advanced Metering Infrastructure in Smart Grid

    The smart grid is a network of computers and power infrastructures that monitor and manage energy usage. This paper aims to provide a deep understanding of security vulnerabilities and solutions in the Smart Grid and shed light on future research directions for Smart Grid security. A security protocol, Integrated Authentication...

    Provided By The World

  • White Papers // Dec 2014

    Analysis on Environmental Decision in Artificial Intelligence System for Multi Disciplinary Applications

    An effective protection of the people environment is largely dependent on the quality of the available information used to make an appropriate decision. Problems dissent when the quantities of forthcoming collection are huge and non homogenous which are future from some antithetical disciplines or sources and their propertied could not...

    Provided By The World

  • White Papers // Dec 2014

    Survey on Minimizing Energy Consumption in Mobile Adhoc Networks

    Mobile ad hoc network consists of nodes that move arbitrarily. It leads to dynamic topologies. Power failure of a mobile node not only affects the node itself but also its ability to forward packet on behalf of others and the overall network life time. For this reason many research efforts...

    Provided By The World

  • White Papers // Nov 2014

    Optimal Contention Window Selection in IEEE 802.11 MAC Protocol for Better Performance of Wireless Networks

    In this paper, the authors investigate the impact of network size and contention window on the performance of the IEEE 802.11 MAC protocol. The performance of any network needs to be evaluated on certain criteria, these criteria then decide the basis of performance of any system. Study on wireless networks'...

    Provided By The World

  • White Papers // Nov 2014

    Quick Predictive Handover to Ensure Optimal QoS in Heterogeneous Mobile Network Platform

    Recently these day, mobile IPv6 based mobile networks are increasing with the widespread popularity of cutting edge wireless internet connectivity. As Internet users are moving away from fixed connections to mobile connections in dealing with their day-to-day activities. In order to remain connected to the Internet while on the go,...

    Provided By The World

  • White Papers // Nov 2014

    E-Mail Fusion with Graph Based Approach Stipulating OPass Security

    Most users are satiated with separately logging in into their multiple accounts, and hence end up spending a large amount of time in accessing them. It becomes a tedious task to remember all email id's and passwords for all their accounts. In this paper, the authors present a single framework...

    Provided By The World

  • White Papers // Oct 2014

    Dynamic Management of Cryptography for Progressive Packet Arrivals in DTNs

    In Delay Tolerant Networks (DTNs) the core challenge is to deal with lack of persistent property and however be able to deliver messages from supply to destination. Particularly, routing schemes that leverage relays' memory and quality area unit a customary resolution so as to boost message delivery delay. Once giant...

    Provided By The World

  • White Papers // Oct 2014

    Intelligent Traffic Management Service for High-Speed Networks by Using Fuzzy Logic Control

    In view of the invasive web traffic, this paper propose a distributed traffic management framework, in which routers area unit deployed with intelligent rate controllers to tackle the traffic mass. in contrast to different express control protocols that ought to estimate network parameters (e.g., link latency, bottleneck information measure, packet...

    Provided By The World

  • White Papers // Oct 2014

    Secure Sharing in Distributed Information Management Applications

    Interaction between entities that may not trust each other is now commonplace on the Internet. This paper focuses on the specific problem of sharing information between distrusting parties. Previous work in this area shows that privacy and utility can co-exist, but often do not provide strong assurances of one or...

    Provided By The World

  • White Papers // Oct 2014

    Facilitating Indirect Mutual Trust for Cloud Storage Systems

    In this digital age, organizations produce a large amount of sensitive data including personal information such as financial data. The local management of such humongous amount of data is problematic and costly due to the requirements of high storage capacity and experienced personnel. Storage-as-a-Service (SaaS) offered by Cloud Service Providers...

    Provided By The World

  • White Papers // Oct 2014

    Opportunistic MANETs: Quality Will Frame for Low Transmission Power

    Opportunistic Mobile Ad-hoc NETworks (MANETs) are a special category of thin and disconnected MANETs wherever knowledge communication exploits isolated contact opportunities among nodes. The authors tend to think about opportunist MANETs wherever nodes move independently haphazardly over a sq. of the plane. Nodes exchange data if they're at a distance...

    Provided By The World

  • White Papers // Oct 2014

    SFT: A Secure and Fast Transmission of Keys to Cooperative Group Communication and Key Management System

    The problem of efficiently and securely broadcasting to a remote cooperative group occurs in many newly emerging networks. A major challenge in devising such systems is to overcome the obstacles of the potentially limited communication from the group to the sender, the unavailability of that of a fully trusted key...

    Provided By The World

  • White Papers // Oct 2014

    Node Stateless in Mantes Network Management by Using Statistics and Security Identifies Protocol

    Address assignment could be a key challenge in impromptu networks due to the dearth of infrastructure. Autonomous addressing protocols need a distributed and self-managed mechanism to avoid address collisions in a very dynamic network with attenuation channels, frequent partitions, and joining leaving nodes. The authors propose and analyze a light-weight...

    Provided By The World

  • White Papers // Oct 2014

    Query Generation for Multimedia Data Selection and Presentation

    Community Question Answering (CAQ) services have acquired popularity over the past years. This service not only allows community members to post and answer questions but also enables general users to seek information from a comprehensive set of well-answered questions. However, current community question answering forums usually produce only textual answers,...

    Provided By The World

  • White Papers // Oct 2014

    Defending Computer Networks From Covert Operations Using Chaos Theory

    Defending computer networks from covert channels is a challenging task in TCP/IP networks. It is necessary for system engineers to know covert channels in order that they are going to be able to preemptively overcome sure security issues. In this paper, the authors propose a new method to find the...

    Provided By The World

  • White Papers // Oct 2014

    ICMP: A Novel Profile Matching Scheme in Mobile Social Networks

    As the increasing use of mobile devices, Mobile Social Networks (MSNs) are becoming an inseparable part of peoples' lives. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However in this paper, the authors create a profile matching application which...

    Provided By The World

  • White Papers // Oct 2014

    Wireless Ad Hoc Networks Creation Based on Secure Protocol

    In this paper, the authors present a secure protocol for spontaneous wireless unexpected networks that uses associate in nursing hybrid symmetric asymmetric theme and therefore the trust between users so as to exchange the initial knowledge and to exchange the key keys that may be used to cipher the information....

    Provided By The World

  • White Papers // Oct 2014

    Firewall Optimization for Privacy-Preserving with Cross Domain

    Firewalls are wide deployed on the net for securing non-public networks. A firewall checks every incoming or outgoing packet to make the users' mind up whether or not to simply accept or discard the packet based on its policy. Optimizing firewall policies is crucial for up network performance. Previous work...

    Provided By The World

  • White Papers // Oct 2014

    A Pragmatic Intervention Model for Network Consistency Evaluation in Wireless Networks

    Wireless sensor networks are originally designed as distributed event-based systems that differ from traditional communication networks in several ways. These networks typically have nodes with severe energy constraints, variable quality links, low data-rate and many-to-one event-to-sink flows. In distributed event-based systems, generally events occur infrequently. Some sensitive applications such as...

    Provided By The World

  • White Papers // Oct 2014

    Attribute-Aware Information Aggregation Exploitation Potential-Based Dynamic Routing in Wireless Detector Networks

    The resources particularly energy in wireless detector networks are quite restricted. Since detector nodes are sometimes much dense, knowledge sampled by detector nodes have a lot of redundancy, knowledge aggregation becomes a good technique to eliminate redundancy, minimize the amount of transmission, then to avoid wasting energy. several applications will...

    Provided By The World

  • White Papers // Oct 2014

    A Joint Congestion Control and Scheduling Algorithm for Decreasing the Delay in Multihop Wireless Networks

    In this paper, a novel method is prepared that quantifies the end-to-delay performance in multi-hop wireless network. A general interference model with fixed route flows can be controlled to reduce the congestion with interference degree K (which is near a minimum of the system capability region), this method quantifies a...

    Provided By The World

  • White Papers // Oct 2014

    Scalable Reliable Multicasting in Delay Tolerant Networks with Erasure Correction

    Delay Tolerant Networks (DTNs), also called as intermittently connected mobile networks, are wireless networks in which a fully connected path from source to destination is unlikely to exist. However, effective forwarding based on a limited knowledge of contact behavior of nodes is challenging. When large files need to be transferred...

    Provided By The World

  • White Papers // Oct 2014

    An Efficient Secure Parallel Distributed Control Protocol for Content Delivery Networks

    Technology has its own way to put forward the next level of research. In the era of Fine dine of IT revolution, where the authors use the Socket layer and its encryption mechanism is a hot cake in the IT Industry, having a good competition to provide the best of...

    Provided By The World

  • White Papers // Oct 2014

    Supervision Termination for Multipath Routing with Intervention Detection in Wireless Sensor Networks

    Research problems are to enhance an Intrusion Detection System (IDS) of a clustered HWSN to prolong its lifetime operation in the presence of unreliable and malicious nodes. Also, to address the energy consumption and QoS gain in reliability, delay and security with the goal to maximize the lifetime of a...

    Provided By The World

  • White Papers // Oct 2014

    EMAP: A Novel Approach for Providing the Security in the Vehicular Ad Hoc Network (VANET)

    A Vehicular Ad-hoc NETwork (VANET) utilizes cars as mobile nodes in a MANET to generate a mobile network. In the vehicular ad hoc networks the protection is an important concern. For protection, Vehicular Ad-hoc NETworks (VANETs) adopt the Public Key Infrastructure (PKI) and Certificate Revocation Lists (CRLs). In the Public...

    Provided By The World

  • White Papers // Oct 2014

    Defending Against Flood Attacks in Distraction Unbiased Networks

    Distraction Unbiased Networks (DUNs) utilize the portability of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DUNs are unprotected to flood attacks in which attackers send as many packets or packet replicas as possible...

    Provided By The World

  • White Papers // Oct 2014

    An Extremely Ascendible Key Pre-Distribution Theme for Wireless Device Networks

    Given the sensitivity of the potential WSN applications and because of resource limitations, key management merges as a difficult issue for WSNs. one amongst the most issues when coming up with a key management theme is that the network scalability. Indeed, the protocol ought to support an outsized range of...

    Provided By The World

  • White Papers // Oct 2014

    Elevated Recital Communication in MIMO Adhoc Associations by Manipulating Supportive Convey

    Wireless sensor association is a compilation of sensors with limited reserves that collaborate in order to achieve a standard goal. It is susceptible to node confine attacks because sensor nodes are deployed in unattended manner. Once opponent confines sensor nodes, they can concession that node and launch various types of...

    Provided By The World

  • White Papers // Oct 2014

    Efficient Distributed Profile Matching Using Multi-Party Computation in Mobile Social Networks

    The profile matching means that 2 user's scrutiny their personal profiles and is usually the primary step towards effective PMSN. It, however, conflicts with users' growing privacy considerations regarding revealing their personal profiles to finish strangers before deciding to move with them the authors protocols alter 2 users to perform...

    Provided By The World

  • White Papers // Oct 2014

    Least Outlay Jamming Obstruction in Multi Path Wireless Routing Protocols

    Key applications is the routing protocol that directs the packet in the network routing packets fully connected to wireless networks has been studied to a great extent but the assumption on full connectivity is generally not valid in a real system. A class of attacks such as network partitioning node...

    Provided By The World

  • White Papers // Oct 2014

    Communication Networks Based on Price Differentiation

    The authors study the optimum usage-based rating downside in a resource constrained network with one increasing service supplier and multiple teams of surplus maximizing users. With the belief that the service supplier is aware of the utility perform of every user (thus complete information), they find that the whole worth...

    Provided By The World

  • White Papers // Oct 2014

    Energy-Efficient Cooperative Video Distribution with Applied Mathematics QoS Provisions Over Wireless Networks

    For period of time video broadcast wherever multiple users have an interest within the same content, mobile-to-mobile cooperation is utilized to enhance delivery potency and cut back network utilization. Below such cooperation, however, period of time video transmission needs end-to-end delay bounds. Because of the inherently random nature of wireless...

    Provided By The World

  • White Papers // Oct 2014

    Power Saving and Reducing Transmission Delay in WSN Using DMP Scheme

    Scheduling the different types of packets, such as real time and non-real time data packets at sensor nodes in WSN is very important in reducing end-to-end data transmission delay. There are several schemes such as FCFS, DMP Scheme. But these have high processing overhead and long end-to-end data transmission delay....

    Provided By The World

  • White Papers // Oct 2014

    Software Testing, Analysis and Objectives

    Software testing is about testing a feature with varying test data to get a result and then comparing the actual result with expected result. It is not merely finding defects or bugs in the software; it is the completely dedicated discipline of evaluating the quality of the software. Software testing...

    Provided By The World

  • White Papers // Oct 2014

    Importance of Load Balancing in Cloud Computing Environment: A Review

    Cloud computing is a term, which involves virtualization, distributed computing, networking, software and web services. A cloud consists of several elements such as clients, datacenter and distributed servers. It includes fault tolerance, high availability, scalability, flexibility, reduced overhead for users, reduced cost of ownership, on demand services etc. Central to...

    Provided By The World

  • White Papers // Oct 2014

    GNU Radio Based BIST for SDR Performance Measurement

    In this paper, the authors investigate on methods to develop Built-In Self-Test (BIST) method for performance measurement of a wideband (20MHz) Software Defined Radio (SDR) with frequency coverage from 50MHz to 2.4GHz. The overall quality of transmission and reception is dictated by various RF system and baseband specifications in wireless...

    Provided By The World

  • White Papers // Oct 2014

    Security Based Intrusion-Detection System for Ad Hoc Mobile Wireless Networks

    The migration to wireless network from wired network has been a worldwide trend within the past few decades. The quality and quantifiability brought by wireless network created it attainable in many applications. Among all the modern wireless networks, Mobile Ad hoc NETwork (MANET) is one among the foremost important and...

    Provided By The World

  • White Papers // Nov 2012

    A Survey on Query Response Time Optimization Approaches for Reliable Data Communication in Wireless Sensor Network

    Wireless sensor network is an application specific network. There are various factors which affects reliability in Wireless Sensor Network some of them are energy consumption, high packet loss, congestion, and large response time. There are different parameters, which affects query response time. Whenever Sink [Base Station] needs data, it sends...

    Provided By The World

  • White Papers // Sep 2012

    Decision Trees for Handling Uncertain Data to Identify Bank Frauds

    Classification is a classical problem in machine learning and data mining. In traditional decision tree classification, a feature of a tuple is either categorical or numerical. The decision tree algorithms are used for classify the certain and numerical data for many applications. In existing system they implement the extended the...

    Provided By The World

  • White Papers // Jan 2013

    Security Algorithms to Prevent Denial of Service (DoS) Attacks in WLAN

    This paper proposes security algorithms which are used to mitigate the Media Access Control (MAC) layer Denial of Service (DoS) attacks in WLAN infrastructure networks. This paper is aimed to attend the DoS attacks due to the susceptibility of the MAC layer's management frames. The management frames are sent unencrypted;...

    Provided By The World

  • White Papers // Jan 2013

    Sampling and Reconstruction of Wireless UWB Pulses by Multi-Stage Exponential Filter

    In wireless Ultra WideBand (UWB) technology the sampling and reconstruction of short impulses (Diracs) is an important research object in signal processing society. In this paper, the authors introduce a Multi-Stage Exponential Filter (MSEF) for sampling and reconstruction of the UWB pulses. The MSEF is constructed from a cascade of...

    Provided By The World

  • White Papers // Aug 2012

    A Study on the Security and Routing Protocols for Ad-Hoc Network

    A Mobile Ad-hoc NETwork (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. ad hoc is a Latin word which means "For this purpose". Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices...

    Provided By The World

  • White Papers // Oct 2012

    Capacity of a Equalizer Based MIMO System

    In wireless communications, spectrum is a scarce resource and hence imposes a high cost on the high data rate transmission. It has been demonstrated that multiple antenna system provides very promising gain in capacity without increasing the use of spectrum, reliability, throughput, power consumption and less sensitivity to fading, hence...

    Provided By The World

  • White Papers // Dec 2012

    Microstrip Antenna: Design Aspects

    The rapid growth and demand of wireless based applications for commercial and personal communication increases the demand of microstrip antennas with the advantage of being low cost, low profile, small size, capable of being integrated with VLSI design. However microstrip antennas have some inherent limitations i.e. narrow bandwidth, low gain,...

    Provided By The World

  • White Papers // Jan 2013

    Intrusion Detection Using Pipelining of Layers With Conditional Random Fields in Multicore Processors

    An intrusion detection system is a predictable element of any computer network system. Now a day's intrusion detection faces a number of key challenging issues. The challenges like detect malicious activities and the large amount of network traffic. In this paper these two issues are addressed using Conditional Random Fields...

    Provided By The World

  • White Papers // Jan 2013

    Lifetime Analysis of MANET in Presence of Selfish Nodes

    The MANETs are self-configuring and decentralized networks without having a fixed infrastructure. In such a network, each node acts as an end-system as well as a relay node (or router). Most of the routing algorithms designed for a MANET are based on the assumption that every node in the network...

    Provided By The World

  • White Papers // Jan 2013

    A Novel Approach on Applications, Research Challenges and Mining for Mobile Crowdsensing

    A new phase of the information society - The Internet of things in which the web will not only link computers but potentially every object created by mankind. An emerging category of devices at the edge of the Internet are consumer centric mobile sensing and computing devices, such as smart...

    Provided By The World

  • White Papers // Jan 2013

    Trusted Dissemation of Data in Opportunistic Network

    With the rapid evolution of network diversity and the development of short range wireless communication technologies, a new network known as opportunistic networks emerges, this kind of network falls into two fields-Mobile Ad-hoc NETwork (MANET) and Delay Tolerant Network (DTN). Opportunistic network thus comprises the methods and features of Delay...

    Provided By The World

  • White Papers // Jan 2013

    Adoption of Cloud Computing in Distance Learning

    The use of distance courses in learning is growing exponentially. To better support faculty and students for teaching and learning, distance learning programs need to constantly innovate and optimize their IT infrastructures. The new IT paradigm called "Cloud computing" has the potential to transform the way that IT resources are...

    Provided By The World

  • White Papers // Jan 2013

    Development of Communication Protocol Conversion Equipment Based on Embedded MCU and RTX51

    Using the embedded multi-MCU and high-speed dual-port RAM data sharing technology, communication protocol conversion equipment based on embedded multi-MCU and real-time multitasking operating system RTX51 has been researched and developed, which adopts RS232 or RS485 communication interfaces for lower machines such as data acquisition I/O modules, smart intelligent instruments and...

    Provided By The World

  • White Papers // Jan 2013

    Analysis of Cluster Based Routing Protocol for Mobile Wireless Sensor Network

    Technological advances in communications and computation have enabled the development of low-cost, low-power, small in size, and multifunctional sensor nodes in a wireless sensor network. Since the radio transmission and reception consumes a lot of energy, one of the important issues in Wireless Sensor Network (WSN) is the inherent limited...

    Provided By The World

  • White Papers // Jan 2013

    Augmentation Data Security Aspects of Cloud Computing

    Cloud computing environments consisting of different modules that handle the security and trust issues of key components. One of the modules is responsible for authentication and identity management. This paper focuses on the issues related to the data security aspect of cloud computing. This paper surveys recent research related to...

    Provided By The World

  • White Papers // Jan 2013

    An Energy-Efficient Congestion Based Clustering Protocol for Wireless Sensor Network Using Round Robin Scheduling Technique

    A wireless sensor networks consists of spatially distributed autonomous sensors nodes called motes. Clustering is an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms consumes much time in setup phase and they hardly consider the congestion problem at the base station and inter-cluster communication...

    Provided By The World

  • White Papers // Jun 2012

    Delay Based End to End Internet Congestion Control Using Natural Logic

    The problem of network congestion management is a major issue and a high priority, especially given the growing size, demand, and speed (bandwidth) of the increasingly integrated services networks. Delay-based algorithms become the preferred approach for end-to-end congestion control as networks scale up in capacity. Their advantage is small at...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Resource Allocation Protocol for Multimedia Wireless Networks

    In the next generation high-speed wireless networks are expected to support multimedia applications (video, voice, and data). As such, it is important that these networks provide Quality-of-Service (QoS) guarantees. Unlike wired networks, communication entities in wireless networks change their connectivity via handoff when user moves from one cell to another....

    Provided By The World

  • White Papers // Jan 2013

    Implementation of Light Weight Internet Controlled Web Server in Embedded Systems

    This paper presents an implementation of a plat form independent embedded web server and its integration into a network of wireless sensor nodes. This allows the user to monitor the operation of the WSN remotely, to periodically download the sensed data, and to change the operation mode of the network....

    Provided By The World

  • White Papers // Jan 2013

    Security and Congestion Control Schema Using Randomized Dispersive Routes in Heterogeneous Networks

    Generally traffic and the sensor network security have many challenges in the transmission of data in the network. The existing schemes consider homogeneous sensor networks which have poor performance and scalability. Due to many-to-one traffic pattern, sensors may communicate with small portion of its neighbors. Key management is the critical...

    Provided By The World

  • White Papers // Jan 2013

    Secure Data Accumulation by Ant Agents in Wireless Sensor Network Using Randomized Dispersive Routing Mechanism

    In this paper, the authors discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP (Non Repetitive Random Propagation). The data accumulation is accomplished by the concept of Honey Ants and ant...

    Provided By The World

  • White Papers // Jan 2013

    Deploying Virtual Cluster Nodes Distributed Over Different Cloud Providers for On-Demand Resource Provisioning

    Cloud computing technologies can offer important benefits for IT organizations and data centers running MTC applications such as elasticity and rapid provisioning, enabling the organization to increase or decrease its infrastructure capacity within minutes, according to the computing necessities; pay as you go model, allowing organizations to purchase and pay...

    Provided By The World

  • White Papers // Jan 2013

    An Efficient Routing Approach to Provide Security in Wireless Networks

    Wireless ad hoc network is autonomous, infrastructure less and may be mobile depending on its type of application. Secure transmission of information in wireless ad hoc environment is an important concern. In this paper, the authors propose to use shared cryptography to secure message communication in ad hoc network. In...

    Provided By The World

  • White Papers // Jan 2013

    Co-Operative Distributed Intrusion Detection in Wireless Ad-Hoc Network

    Intrusion detection in wireless ad hoc networks is a challenging task because these networks change their topologies dynamically, lack concentration points where aggregated traffic can be analyzed, utilize infrastructure protocols that are susceptible to manipulation, and rely on noisy, intermittent wireless communications. Security remains a major challenge for these networks...

    Provided By The World

  • White Papers // Jan 2013

    Video Signal Transmission Through DWDM Network

    In this paper, the authors proposed a procedure, which determines where the interruption of the quality of transmission starts. Based on the algorithm, simulations of transmission for specific values are executed. The analysis of the results showed how the BER and Q-factor change depending on the length of the fiber,...

    Provided By The World

  • White Papers // Jan 2013

    Parameter Estimation of Price-Demand Model for Cloud Data Services

    Cloud applications that offer data management services are emerging. Such clouds support caching of data in order to provide quality query services. The users can query the cloud data, paying the price for the infrastructure they use. Cloud management necessitates an economy that manages the service of multiple users in...

    Provided By The World

  • White Papers // Jan 2013

    Resistant Protocol to Resist Large-Scale Online Password Guessing Attacks

    Passwords, passphrases and security codes are used in virtually every interaction between users and information systems. Unfortunately, with such a central role in security, easily guessed passwords are often the weakest link. They grant attackers access to system resources; and bring them significantly closer to being able to access other...

    Provided By The World

  • White Papers // Jan 2013

    Anonymous Processing of Query in Road Networks

    The increasing availability of location aware mobile devices has given rise to a flurry of Location-Based Services (LBS). Due to the nature of spatial queries, an LBS needs the user position in order to process the requests. On the other hand, revealing exact user locations to (potentially untrusted) LBS may...

    Provided By The World

  • White Papers // Jan 2013

    Optimisation of the VLSI Architecture in Wireless Sensor Network

    Optimisation of VLSI architecture in Wireless Sensor Network (WSN) scheme for fusion centre to detect the faults of sensor nodes via Efficient Collaborative Sensor Fault Detection (ECSFD), these scheme identifies the sensor node fault percentage and its efficiency of the particular sensor node. In real world most of the applications...

    Provided By The World

  • White Papers // Apr 2012

    An Analysis and Comparison of Multi-Hop Ad-Hoc Wireless Routing Protocols for Mobile Node

    A Mobile Ad-Hoc NETwork (MANET) is a group of wireless nodes and distributed throughout the network. In MANET each node using the multi hops wireless links without an infrastructure or centralized administration. Now days, a variety of routing protocols targeted specifically at this environment have been developed and some performance...

    Provided By The World

  • White Papers // Apr 2012

    Use of Data Mining in Emergency Evacuation Planning

    Evacuating large numbers of people during a natural disaster or terrorist attack is a vital challenge for emergency management professionals. This is even a continuous pressure on the management in the hurricane zones. Hurricanes Katrina and Rita vividly illustrated this problem. Miles-long traffic jams on the highways during any evacuation...

    Provided By The World

  • White Papers // Aug 2012

    Skin Tone Based Secrete Communication Using DWT

    Steganography is the art of hiding the existence of data in another transmission medium to achieve secret communication. It does not replace cryptography but rather boosts the security using its obscurity features. Steganography method used in this paper is based on biometrics. And the biometric feature used to implement Steganography...

    Provided By The World

  • White Papers // Aug 2012

    Design and Verification of Performance of 32 Bit High Speed Truncation-Error -Tolerant Adder

    In this paper, the authors have proposed an architecture for high speed Truncation Adder Algorithm. In modern VLSI technology, the occurrence of all kinds of errors has become inevitable. By adopting an emerging concept in VLSI design and test, Error Tolerance (ET), a novel Error-Tolerant Adder (ETA) is proposed. The...

    Provided By The World

  • White Papers // Aug 2012

    Mobile Cloud a New Vehicle for Learning: M-Learning Its Issues and Challenges

    Today, the people are witnessing the emergence of a connected, mobile society, with a variety of information sources and means of communication available at home, office, organizations and in the community at large. To be always connected there are many ways like mobile, tablet etc. Although, cloud computing has established...

    Provided By The World

  • White Papers // Oct 2012

    Rapid Face Recognition Technology Using Eigenfaces and Gabor Filter

    Face recognition is one of biometric methods, to identify given face image using main features of face. Face recognition system is a computer application for automatically identifying or verifying a person from a digital image. Gabor filters have proven themselves to be a powerful tool for feature extraction. Proposed methodology...

    Provided By The World

  • White Papers // Oct 2012

    The Development of Road Lighting Intelligent Control System Based on Wireless Network Control

    Energy problem is a social focus now-a-days. Energy-saving and environmental protection is the policy of China. According to the people national conditions, road lighting system of their country is still emerging technologies. In this paper, to reach the purpose of energy saving, it introduces an information method to deal with...

    Provided By The World

  • White Papers // Aug 2012

    Channel Capacity of MIMO System Over NAKAGAMI- M Fading Channel

    Multiple Input and Multiple Output (MIMO) system have the potential to achieve very high capacities, depending on the propagation environment. A MIMO system provides multiple independent transmission channels, thus, leading (under certain conditions) to a channel capacity that increases linearly with the number of antenna elements. It is well known...

    Provided By The World

  • White Papers // Aug 2012

    Analysis and Implementation of FP & Q-FP Tree with Minimum CPU Utilization in Association Rule Mining

    Association rule mining, one of the most important and well researched techniques of data mining, was first introduced in. It aims to extract interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. However, no method has been shown to...

    Provided By The World

  • White Papers // Aug 2012

    Energy Efficient Geographical Routing Protocol with Location Awareness in Mobile AdHoc Network

    A Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the...

    Provided By The World

  • White Papers // Oct 2012

    Analysis on AES Algorithm Using Symmetric Cryptography

    In this paper, the authors present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in...

    Provided By The World