Universal Association of Computer and Electronics Engineers

Displaying 1-40 of 88 results

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Simulation Based Analysis of Position Based Routing Protocols in Vehicular Ad Hoc Networks

    The Vehicular Ad Hoc NETwork (VANET) is a promising new paradigm in the domain of wireless communication employed specially for providing road safety, comfort and convenience to the driver as well as passengers while on the way by the integration of various wireless network technologies, cellular technologies like 2G and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Multiple Channel Implementations in Wireless Mesh Networks

    The much research progress has been made in network capacity analysis of ad-hoc networks, WMNs have not been fully explored due to the difference between WMNs and ad-hoc networks. The result about network capacity and optimum node density of ad-hoc networks may not directly be applied to the WMNs because...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Design of Stepped-Impedance Microstrip Line Low Pass Filter for Wireless Communication

    Filters play an important role in microwave applications. Microwave systems have an enormous impact on modern society. Applications are diverse, from entertainment via satellite television, to civil and military radar system. In particular, the recent trend of multi-frequency bands and multifunction operations in wireless communication systems along with the explosion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Various Key Exchanging Algorithms

    The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Security Threats

    Cloud is a fundamental shift in the IT architecture, which is why there's a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Energy Efficient Routing Protocol Using Clustering Technique

    The past few years have witnessed increased interest in the potential use of Wireless Sensor Networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Network Security Evaluation Based on Information Security

    The Network security Evaluation is a development of computer and network hot issue in present research of Network technology brings them convenience together security. After acquiring each host's web-based threat exists everywhere, and to attack. Therefore, study and evaluation of the network security will be important practical significance: finding out...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Framing Sequence Algorithms in Netsim

    NetSim is a network simulation tool used by the academic community for teaching. The Data Link Layer deals with the algorithms for achieving reliable, efficient communication between two adjacent machines above the physical layer. Framing is a Protocol Data Unit (PDU) for data link layer is often called a frame...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Longitudinal Redundancy Check and Cyclic Redundancy Check Algorithms Using Netsim

    Network Simulation is a comprehensive tool for studying computer networks. NetSim features state of the art network simulation technology, and comes with additional offerings that enhance and quicken learning. NetSim is an educational network simulator and provides educators with a comprehensive and effective means of teaching computer networks. The software...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Hiding Information by Using Image Steganography

    Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Intrusion Detection and Prevention System

    As the importance of computers are increasingly integrated into the systems the ability to detect intruders in computer systems also increases as the authors rely on for the correct functioning of society. Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. The process...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Novel Call Admission Control Scheme for Multimedia Traffic in IEEE 802.16e OFDMA Systems

    IEEE 802.16e Broadband Wireless Access (BWA) technology is one of the most promising technologies for broadband access and has many applications. In order to meet the requirements of diverse multimedia services, it is necessary to provide Quality of Service (QoS) guarantee. Call Admission control plays an important role in QoS...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Architecture: Noise Pollution Monitor Through Wireless Sensor Network

    The area of wireless sensor network is wide & there are various kinds of sensor devices are used in mobile applications. Sensors monitor the environmental activities like air pollution, noise level, water level, greenhouse monitoring, agriculture monitor etc which grows & generates greater interest & becomes a challenge for finding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security and Privacy Enabling Lightweight Solution for Vehicular Networks

    Vehicular Ad-Hoc NETwork (VANET) is an emerging area of wireless networks which allows vehicles to communicate enabling Intelligent Transportation System (ITS). Immense amount of research is going on both by industry and academia. In vehicular communication there occurs frequent handover because of the high speed of vehicles and hence there...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effective Data Mining Techniques for Intrusion Detection and Prevention System

    The main purpose of Intrusion Detection Systems (IDS) and Intrusion protection Systems (IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Review of Routing and Switching

    The computer network are playing an important role in providing services to large organization as well as to individual person. A network is a group of interconnected computers that allows to share information and resources (such as printers) from one computer to another. A network with the right software helps...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Services for Converged IP Networks

    Rapid growth of computer network leading to converging necessitates management of servers by a server. Simple Network Management Protocol (SNMP) based management cannot be used for the converged network management due to its limitations and relatively simple monitoring. Therefore, alternative technologies are required to meet various goals such as scalability,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Approach for Geographic Routing Using Virtual Coordinates for WMN

    Several routing algorithms that exploit geographic information (e.g., GPSR) have been proposed. These algorithms refer to the nodes by their location, not address, and use this information to route greedily, when possible, towards the destination. However, there are many situations where location information is not available at the nodes, and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Space Time Block Codes: An Overview

    The demand for mobile communication systems with high data rates has dramatically increased in recent years. New methods are necessary in order to satisfy this huge communications demand, exploiting the limited resources such as bandwidth and power as efficient as possible. In wireless communication systems, multiple antennas when used with...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Implementation Issues and What to Compute on Cloud

    The development of worldwide networks, open systems and new technology trends a new type of computing where computational power is provided similar to utilities like water, gas or electricity. Cloud computing refers to the concept of grid computing, utility computing and virtualization. It elevates knowledge management to newer heights by...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effect of CWND and RTO in the Performance of Wireless Networks

    In this paper, the authors describe a ns based simulation analysis of TCP performance over a hybrid network with first link as a wireless link. The latter choice is for understanding performance issues with better clarity. The effect of wireless errors on different TCP parameters resulted into end to end...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Trusted Agent-Based On-Demand Routing Protocol in MANET

    Ad-hoc wireless networks are self-organising, infrastructure less networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communicate with each other through radio links in multihop specified routing protocols. The concept of agent is introduced in MANET to reduce the load on node...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    The Economic Perspective of Cloud Computing

    Cloud computing is an innovative, emerging and a novel phenomenon that paves the way for provisioning of infinitely scalable, re-usable, multipurpose, flexible, cost-saving, efficient and customizable on-demand information technology services and products. The promise of cloud computing is to deliver all the functionality of existing information technology services (and in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementing Video Data Compression Along With Network Coding in Video Multicast

    This paper presents a technical review to real time Video Multicast. In this paper Video Multicast technique is being described and to improve the quality and efficiency using network coding and video data compression. Video data compression is concerned with reducing the amount of data required to reproduce a digital...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) can be described as a collection of untethered sensor nodes. An important application of WSN is in the field of real-time communication. Real-time communication is a critical service which requires a qualitative routing protocol for energy-efficient network communication. The judicious use of energy of the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus Like Environment

    With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to make such a system. The primary issues of element management are taken into consideration in this paper and the main...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Fax Over IP Using T.38 Over SIP

    Facsimile (fax) transmission is very important to the world of business. In a world where a significant percentage of long distance Public Switched Telephone Network (PSTN) traffic is composed of fax, great savings in toll charges are possible by utilizing IP networks instead. This paper is a brief survey on...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issues in Distributed Multihop WiMAX Networks

    In this paper, the authors study the existing standards in multihop WiMAX networks and their security issues. For secured communications, it is necessary to have hop-by-hop authentication for any multihop wireless networks. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Reducing Message Overhead in On-Demand Mesh Based Multicast Routing Protocols

    In wireless networks, due to limited battery power, it is crucial to reduce the transmission overhead and power consumption. In this paper, the authors discuss how to achieve low transmission overhead and reduced power consumption by minimizing the transmission of redundant control messages. The popular on-demand multicast routing protocols like...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Modular Approach for Intrusion Detection System in Wireless Networks

    The increasing reliance upon wireless networks has put tremendous emphasis on wireless network security. Intrusion detection in wireless network has become an indispensable component of any useful wireless network security system, and has recently gained attention in both research and industry communities due to widespread use of Wireless Local Area...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Host-Based Intrusion Detection Against Distributed Denial of Service Attacks

    One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a Distributed Denial-of-Service (DDoS) attack, an attacker may use one computer to attack another computer....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Simulation Based Analysis of Position Based Routing Protocols in Vehicular Ad Hoc Networks

    The Vehicular Ad Hoc NETwork (VANET) is a promising new paradigm in the domain of wireless communication employed specially for providing road safety, comfort and convenience to the driver as well as passengers while on the way by the integration of various wireless network technologies, cellular technologies like 2G and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Multiple Channel Implementations in Wireless Mesh Networks

    The much research progress has been made in network capacity analysis of ad-hoc networks, WMNs have not been fully explored due to the difference between WMNs and ad-hoc networks. The result about network capacity and optimum node density of ad-hoc networks may not directly be applied to the WMNs because...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Design of Stepped-Impedance Microstrip Line Low Pass Filter for Wireless Communication

    Filters play an important role in microwave applications. Microwave systems have an enormous impact on modern society. Applications are diverse, from entertainment via satellite television, to civil and military radar system. In particular, the recent trend of multi-frequency bands and multifunction operations in wireless communication systems along with the explosion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Various Key Exchanging Algorithms

    The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Security Threats

    Cloud is a fundamental shift in the IT architecture, which is why there's a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Energy Efficient Routing Protocol Using Clustering Technique

    The past few years have witnessed increased interest in the potential use of Wireless Sensor Networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Network Security Evaluation Based on Information Security

    The Network security Evaluation is a development of computer and network hot issue in present research of Network technology brings them convenience together security. After acquiring each host's web-based threat exists everywhere, and to attack. Therefore, study and evaluation of the network security will be important practical significance: finding out...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Framing Sequence Algorithms in Netsim

    NetSim is a network simulation tool used by the academic community for teaching. The Data Link Layer deals with the algorithms for achieving reliable, efficient communication between two adjacent machines above the physical layer. Framing is a Protocol Data Unit (PDU) for data link layer is often called a frame...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Longitudinal Redundancy Check and Cyclic Redundancy Check Algorithms Using Netsim

    Network Simulation is a comprehensive tool for studying computer networks. NetSim features state of the art network simulation technology, and comes with additional offerings that enhance and quicken learning. NetSim is an educational network simulator and provides educators with a comprehensive and effective means of teaching computer networks. The software...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Hiding Information by Using Image Steganography

    Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Intrusion Detection and Prevention System

    As the importance of computers are increasingly integrated into the systems the ability to detect intruders in computer systems also increases as the authors rely on for the correct functioning of society. Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. The process...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Novel Call Admission Control Scheme for Multimedia Traffic in IEEE 802.16e OFDMA Systems

    IEEE 802.16e Broadband Wireless Access (BWA) technology is one of the most promising technologies for broadband access and has many applications. In order to meet the requirements of diverse multimedia services, it is necessary to provide Quality of Service (QoS) guarantee. Call Admission control plays an important role in QoS...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Architecture: Noise Pollution Monitor Through Wireless Sensor Network

    The area of wireless sensor network is wide & there are various kinds of sensor devices are used in mobile applications. Sensors monitor the environmental activities like air pollution, noise level, water level, greenhouse monitoring, agriculture monitor etc which grows & generates greater interest & becomes a challenge for finding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security and Privacy Enabling Lightweight Solution for Vehicular Networks

    Vehicular Ad-Hoc NETwork (VANET) is an emerging area of wireless networks which allows vehicles to communicate enabling Intelligent Transportation System (ITS). Immense amount of research is going on both by industry and academia. In vehicular communication there occurs frequent handover because of the high speed of vehicles and hence there...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effective Data Mining Techniques for Intrusion Detection and Prevention System

    The main purpose of Intrusion Detection Systems (IDS) and Intrusion protection Systems (IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Review of Routing and Switching

    The computer network are playing an important role in providing services to large organization as well as to individual person. A network is a group of interconnected computers that allows to share information and resources (such as printers) from one computer to another. A network with the right software helps...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Services for Converged IP Networks

    Rapid growth of computer network leading to converging necessitates management of servers by a server. Simple Network Management Protocol (SNMP) based management cannot be used for the converged network management due to its limitations and relatively simple monitoring. Therefore, alternative technologies are required to meet various goals such as scalability,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2011

    Communication in Parallel and Distributed Systems

    Communication is an essential part of distributed computing and parallel computing. There exist many topologies, network architectures and routing schemas for such type of communication. In this paper, the authors will review a few selected network architectures and routing schemes, which are continually going through evolution process. Parallel and distributed...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Approach for Geographic Routing Using Virtual Coordinates for WMN

    Several routing algorithms that exploit geographic information (e.g., GPSR) have been proposed. These algorithms refer to the nodes by their location, not address, and use this information to route greedily, when possible, towards the destination. However, there are many situations where location information is not available at the nodes, and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Space Time Block Codes: An Overview

    The demand for mobile communication systems with high data rates has dramatically increased in recent years. New methods are necessary in order to satisfy this huge communications demand, exploiting the limited resources such as bandwidth and power as efficient as possible. In wireless communication systems, multiple antennas when used with...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Aug 2011

    Parameters Effecting Mobile Number Portability and Fuzzy Logic Based MNP Decision

    Mobile Number Portability (MNP) means that a subscriber of one telecommunication operator is able to keep his telephone number unchanged when switching to another operator. As one of the development trends of the international telecommunication industry, number portability has been introduced in many countries around the world and has played...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Implementation Issues and What to Compute on Cloud

    The development of worldwide networks, open systems and new technology trends a new type of computing where computational power is provided similar to utilities like water, gas or electricity. Cloud computing refers to the concept of grid computing, utility computing and virtualization. It elevates knowledge management to newer heights by...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effect of CWND and RTO in the Performance of Wireless Networks

    In this paper, the authors describe a ns based simulation analysis of TCP performance over a hybrid network with first link as a wireless link. The latter choice is for understanding performance issues with better clarity. The effect of wireless errors on different TCP parameters resulted into end to end...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Trusted Agent-Based On-Demand Routing Protocol in MANET

    Ad-hoc wireless networks are self-organising, infrastructure less networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communicate with each other through radio links in multihop specified routing protocols. The concept of agent is introduced in MANET to reduce the load on node...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    The Economic Perspective of Cloud Computing

    Cloud computing is an innovative, emerging and a novel phenomenon that paves the way for provisioning of infinitely scalable, re-usable, multipurpose, flexible, cost-saving, efficient and customizable on-demand information technology services and products. The promise of cloud computing is to deliver all the functionality of existing information technology services (and in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementing Video Data Compression Along With Network Coding in Video Multicast

    This paper presents a technical review to real time Video Multicast. In this paper Video Multicast technique is being described and to improve the quality and efficiency using network coding and video data compression. Video data compression is concerned with reducing the amount of data required to reproduce a digital...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) can be described as a collection of untethered sensor nodes. An important application of WSN is in the field of real-time communication. Real-time communication is a critical service which requires a qualitative routing protocol for energy-efficient network communication. The judicious use of energy of the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus Like Environment

    With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to make such a system. The primary issues of element management are taken into consideration in this paper and the main...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Fax Over IP Using T.38 Over SIP

    Facsimile (fax) transmission is very important to the world of business. In a world where a significant percentage of long distance Public Switched Telephone Network (PSTN) traffic is composed of fax, great savings in toll charges are possible by utilizing IP networks instead. This paper is a brief survey on...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issues in Distributed Multihop WiMAX Networks

    In this paper, the authors study the existing standards in multihop WiMAX networks and their security issues. For secured communications, it is necessary to have hop-by-hop authentication for any multihop wireless networks. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Reducing Message Overhead in On-Demand Mesh Based Multicast Routing Protocols

    In wireless networks, due to limited battery power, it is crucial to reduce the transmission overhead and power consumption. In this paper, the authors discuss how to achieve low transmission overhead and reduced power consumption by minimizing the transmission of redundant control messages. The popular on-demand multicast routing protocols like...

    Provided By Universal Association of Computer and Electronics Engineers