Universal Association of Computer and Electronics Engineers

Displaying 1-40 of 87 results

  • White Papers // May 2012

    Implementation of Network Based Worm Infection and Detection

    Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. In this paper, the authors have successfully detected the worm propagation characteristics of different and using permutation scanning to find the worms using branch process model to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Adaptive Multi-Path Link Quality Routing Protocol for Mobile Ad-Hoc Network

    Mobile Ad Hoc NETwork (MANET) is a collection of mobile nodes interconnected by wireless media. Routing protocols for Wireless ad hoc networks have traditionally focused on finding paths with different link quality metrics such as minimum hop count, RSSI (Received Signal Strength Indication), SNR (Signal-to-Noise Ratio), BER (Bit Error Rate)....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Very Fast Elliptic Curve Cryptography Public-Key Generator on Koblitz Curves

    This paper presents Xilinx vertex-5 FPGA-based very fast elliptic curve cryptography public key generator on Koblitz curves targeting for applications requiring high speed. The generator supports both fast computation of point multiplication using window method and multiple point multiplications with joint sparse form representations. In order to achieve better performance,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus Like Environment

    With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to make such a system. The primary issues of element management are taken into consideration in this paper and the main...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Fax Over IP Using T.38 Over SIP

    Facsimile (fax) transmission is very important to the world of business. In a world where a significant percentage of long distance Public Switched Telephone Network (PSTN) traffic is composed of fax, great savings in toll charges are possible by utilizing IP networks instead. This paper is a brief survey on...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issues in Distributed Multihop WiMAX Networks

    In this paper, the authors study the existing standards in multihop WiMAX networks and their security issues. For secured communications, it is necessary to have hop-by-hop authentication for any multihop wireless networks. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Reducing Message Overhead in On-Demand Mesh Based Multicast Routing Protocols

    In wireless networks, due to limited battery power, it is crucial to reduce the transmission overhead and power consumption. In this paper, the authors discuss how to achieve low transmission overhead and reduced power consumption by minimizing the transmission of redundant control messages. The popular on-demand multicast routing protocols like...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Modular Approach for Intrusion Detection System in Wireless Networks

    The increasing reliance upon wireless networks has put tremendous emphasis on wireless network security. Intrusion detection in wireless network has become an indispensable component of any useful wireless network security system, and has recently gained attention in both research and industry communities due to widespread use of Wireless Local Area...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Host-Based Intrusion Detection Against Distributed Denial of Service Attacks

    One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a Distributed Denial-of-Service (DDoS) attack, an attacker may use one computer to attack another computer....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issue of E-Governance

    This is the age of information and technology. There are numerous opportunities for organizations to shape the future by providing efficient services and obtaining a competitive advantage for handling products and services. E-governance refers to application of information technology tools in the administration to provide quick and transparency of information...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Modeling and Performance Analysis of Iburst, Hiperman and GSM

    In this paper, the authors propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. Reducing the bandwidth cost of an Internet Protocol (IP) multicast tree by adaptively selecting the cell and the wireless technology for each mobile host to join the multicast group. The mechanism enables more mobile hosts, leads...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    On Demand Routing Protocols in Manet

    A Mobile Ad Hoc NETwork (MANET) is a network consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The dynamic topology of a mobile ad hoc network poses a real challenge in the design of a MANET routing protocol. Over...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Evaluation of Various Routing Protocols Used in Manet

    A Mobile Ad-hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers connected wirelessly. MANET may operate in a standalone fashion, or may be connected to the larger Internet. Many routing protocols have been developed for MANETs over the past few years....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Computer Based Audio Steganography

    People use cryptography to send secret messages to one another without a third party overseeing the message. Steganography is a type of cryptography in which the secret message is hidden in another message. In this paper, a method of hiding the speech signal inside a music file using LSB coding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Approach for Geographic Routing Using Virtual Coordinates for WMN

    Several routing algorithms that exploit geographic information (e.g., GPSR) have been proposed. These algorithms refer to the nodes by their location, not address, and use this information to route greedily, when possible, towards the destination. However, there are many situations where location information is not available at the nodes, and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Space Time Block Codes: An Overview

    The demand for mobile communication systems with high data rates has dramatically increased in recent years. New methods are necessary in order to satisfy this huge communications demand, exploiting the limited resources such as bandwidth and power as efficient as possible. In wireless communication systems, multiple antennas when used with...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Implementation Issues and What to Compute on Cloud

    The development of worldwide networks, open systems and new technology trends a new type of computing where computational power is provided similar to utilities like water, gas or electricity. Cloud computing refers to the concept of grid computing, utility computing and virtualization. It elevates knowledge management to newer heights by...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effect of CWND and RTO in the Performance of Wireless Networks

    In this paper, the authors describe a ns based simulation analysis of TCP performance over a hybrid network with first link as a wireless link. The latter choice is for understanding performance issues with better clarity. The effect of wireless errors on different TCP parameters resulted into end to end...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Trusted Agent-Based On-Demand Routing Protocol in MANET

    Ad-hoc wireless networks are self-organising, infrastructure less networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communicate with each other through radio links in multihop specified routing protocols. The concept of agent is introduced in MANET to reduce the load on node...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    The Economic Perspective of Cloud Computing

    Cloud computing is an innovative, emerging and a novel phenomenon that paves the way for provisioning of infinitely scalable, re-usable, multipurpose, flexible, cost-saving, efficient and customizable on-demand information technology services and products. The promise of cloud computing is to deliver all the functionality of existing information technology services (and in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementing Video Data Compression Along With Network Coding in Video Multicast

    This paper presents a technical review to real time Video Multicast. In this paper Video Multicast technique is being described and to improve the quality and efficiency using network coding and video data compression. Video data compression is concerned with reducing the amount of data required to reproduce a digital...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) can be described as a collection of untethered sensor nodes. An important application of WSN is in the field of real-time communication. Real-time communication is a critical service which requires a qualitative routing protocol for energy-efficient network communication. The judicious use of energy of the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Review of Routing and Switching

    The computer network are playing an important role in providing services to large organization as well as to individual person. A network is a group of interconnected computers that allows to share information and resources (such as printers) from one computer to another. A network with the right software helps...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Services for Converged IP Networks

    Rapid growth of computer network leading to converging necessitates management of servers by a server. Simple Network Management Protocol (SNMP) based management cannot be used for the converged network management due to its limitations and relatively simple monitoring. Therefore, alternative technologies are required to meet various goals such as scalability,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    DDOS Mitigation Techniques-A Survey

    Distributed Denial of Service (DDOS) attacks are one of the most widely spread problems faced by most of the Internet Service Providers (ISP's) today. Mitigation of these attacks has gained utmost importance in the present scenario. A number of mitigation techniques have been proposed by various researchers. The authors enable...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Digital Watermarking: Current Status and Key Issues

    Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Clustering Protocol Based on Tree Routing Algorithm in Wireless Sensor Networks (WSNs)

    In today's world Wireless Sensor Networks (WSNs) are an emerging technology for monitoring physical environment. WSNs consist of small nodes with sensing, computation and wireless communications capabilities. These sensor nodes are constrained in energy supply, processing and storage. Such constraints combined with a typical deployment of large number of sensor...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Analysis of Enhanced AODV and AODV for Mobile Ad-Hoc Network

    A Mobile Ad hoc NETwork (MANET) is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Secure Communication of Wireless Sensor Network (WSN) Using Coding Theory

    Several schemes to establish secret key between sensor nodes in wireless sensor network for secure communication has been proposed. But due to lack of priori deployment knowledge and limited resources of sensor nodes and security threats, it is always challenging to propose a better scheme apart from existing. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Is the Primary Goal for Designing a WSN

    The authors are aware that the power limitation is a critical issue for the sensor nodes, so different scheme or algorithm was proposed to implement the routing protocols to expand the minimum power utilize the maximum work. But it is unfortunate that most of them are not security concerned. As...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Machine Learning Based Anomaly Detection Techniques for Network Intrusion Detection Systems

    Intrusion Detection Systems (IDSs) are an important component of defensive measures protecting computer systems and networks from abuse. Due to the rising complexity and volume of the attacks in the network, Network Intrusion detection systems are preferred over Host based Intrusion detection systems. NIDS are categorized as misuse network intrusion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Application of LZW Technique for ECG Data Compression

    The ECG is an electronic method of recording the heart beat of the patient. The characteristic of heart beat is determined by PQRST curve. By attaching additional leads while recording ECG signals they require higher sampling rates and finer amplitude resolution, for non-cardiac signals such as blood pressure and respiration...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Securing e-Commerce Application Against Various Vulnerability

    The use of internet is increasing rapidly and as the role of e-commerce application is also increases some of these application are quite secure and some of them are unsecure many vulnerability can easily exploit them .Security measure are not effective. And in order to protect these e-commerce application many...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Optimal Implementation of Digital Steganography in an Image for the Secret Communication

    A real-life requirement motivated this case study of secure covert communication. Steganography is a technique used to transfer hidden information in an imperceptible manner. The authors proposed a novel approach of substitution technique of image steganography. The proposed method is completely flexible on size of secret message bits and allows...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Block Truncation Coding With EBTC

    This comparison paper scrutinizes image compression using Block Truncation Coding. Many algorithms were selected likely the original Block Truncation coding, Absolute Moment Block Truncation Coding, a comparison survey was executed. These above techniques are divided image into non overlapping blocks. The authors distinguish in the direction of choosing the quantization...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Tracking and Controlling Object Oriented Software Progress

    There are many ways to look at a problem to be solved using a software-based solution. One widely used approach to problem solving takes an object-oriented viewpoint. The definition of objects encompasses a description of attributes, behaviors, operations, and messages. An object encapsulates both data and the processing that is...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Malware Incident Handling

    The paper will be a detailed introduction of malware handling for security professionals. This paper will also serve as a guideline for the reader to perform malware handling by providing definitions, tools to use, and real world demonstration to the reader with enough information to successfully perform malware incident handling....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Controlling Free Riding Using Extended Point Based Incentive Mechanism in Peer-to-Peer Networks

    Over the years of the emergence of peer-to-peer systems a phenomenon named 'Free Riding' has affected its performance and become a serious threat to be resolved. Free riding phenomenon was first felt in the study of Gnutella. As the number of free riders increases, the performance of the overall system...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Security Challenges & Resolutions in Cloud Computing

    Cloud computing is a model to provide on-demand network, software and hardware resources to customers. It provides the infrastructure, storage and virtualization environment to end-users without vendor's interventions. The purpose of cloud computing is to provide as-a-service model to users. Usually Cloud suffers from various levels of risks because essential...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Encryption Mechanism for System-on-Chip Using MiniDES Algorithm With Digital Signature for Secure Communication of Embedded Real Time Applications

    System-on-Chip applications have been widen to various public, private, government and social communication systems for handling security and trust as a systems for mission critical and e-government. Most mission critical and embedded real time applications run on System -on -Chip. SoCs will have limited resources, processing ability and rigid power...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Elliptic Curve Cryptographic Algorithm

    This paper deals with an implementation of Elliptic Curve Cryptography Algorithm. The implementation includes Diffie Hellman Key Exchange and the Digital Signature Algorithm. This paper gives an overview of Elliptic Curve Cryptography algorithm. Cryptography (or cryptology) from Greek word kryptos, "Hidden, secret"; and graph, "Writing" is the practice and study...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Transaction Security of Mobile Payments Using IMEI Number and Call Back Technique

    In recent years, on-demand routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency. There exist many on-demand routing protocols for Mobile Ad hoc NETworks (MANETS). Most of the protocols, however, use a single route and do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Multiple Routing Algorithm for Wireless Ad Hoc Network

    In recent years, on-demand routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency. There exist many on-demand routing protocols for Mobile Ad hoc NETworks (MANETS). Most of the protocols, however, use a single route and do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Development of Wireless Sensor Network (WSN) for Remote Monitoring of Illegal Cutting Trees in Forest

    Wireless Sensor Networks (WSNs) have been emerging as one of the most promising research areas in recent years and are widely recognized as powerful means for in situ observations of events and environments over long period of time. The wide spectrum of WSNs can offer application such as environment and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Efficient Firewall Designing Using Ant Colony Optimization and Hierarchical Distribution

    A firewall is a security guard placed at the point of entry between a private network and the outside Internet such that all incoming and outgoing packets have to pass through it. The function of a firewall is to examine every incoming or outgoing packet. Here the paper aims to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Mobile Telephony Communication Using WIFI P2P

    The purpose of this paper is to design and implement a telephony program that uses Wi-Fi using Peer-to-Peer communication between mobile phones without any cost. The system will allow users to search for other individuals within the Wi-Fi range and to establish free P2P voice connections, or to establish virtual...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Web Server Optimization: A DNS Based Approach

    A group of web-server system can be deployed to support high request rate. The Domain Name System (DNS) servers act as a mediator between the client and web-servers. It dispatches the client request among the web-servers through the URL-name to IP-address mapping mechanism. In this paper, the authors propose a...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Wireless Sensor Embedded Steering Wheel for Real Time Monitoring of Driver Fatigue Detection

    Accidents due to drowsy driving have shown a steep increase in the past decade. An efficient safety measure is required to mitigate the impact of accidents. This paper details the system architecture for real-time, non-obstructive, automatic detection and alarming for driver drowsiness. Data/sensor fusion technology incorporated with the system monitors...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    A Security Mechanism for Remote Monitoring System Security Using Smartphone

    This paper proposes a security mechanism for remote monitoring system through a combination between user's password and random number by using SMS service over 3G networks. By using random number and phone number, this mechanism is not only able to provide robust security from replay attack and dictionary attack but...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Reliable Protection Scheme Against Cooperative Black Hole Attack in MANET

    Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Black Hole Attack against network integrity...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Improvement Authentication of Routing Protocols for Mobile Ad Hoc Networks

    Ad Hoc network Consist of mobile hosts (or nodes) which communicate with other nodes through wireless medium without any fixed infrastructure. Dynamic network topology: the mobile nodes are free to move randomly and organize themselves arbitrarily the wireless links in this network are highly error prone and can do down...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    A Scheme of Detection and Prevention Rogue AP Using Comparison Security Condition of AP

    Rogue Access Points (RAPs) cause serious security threats to wireless networks. To detect RAPs, the authors propose a novel user-oriented framework based on security condition. AP's security condition which includes cipher and authentication type has been specified by the vendors. So, it is difficult to be faked when authentication type...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    RC4: An Analysis With Respect to Randomness

    The paper aims to study one of the most widely used stream cipher, RC4. The bytes generated by the Psedo Random Generator Algorithm (PRGA) of RC4 are evaluated to check the randomness. Some widely known and accepted statistical measures are applied for this purpose. This is then followed by modifying...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Review of Short Messaging Service Security

    Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitive information between the business and its...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Analyzing the Effect of Playout Buffer Adjustment on Voice Quality for VoIP Based Social-Network Applications

    Social networks are making the dream of real time group communication a reality. Voice over Internet Protocol (VoIP)based social network applications are becoming popular but are also suffering from Quality of Service (QoS) and Quality of Experience (QoE) issues. In order to add to its popularity and reliance VoIP based...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Seamless Handover Between CDMA2000 and 802.11 WLAN Using MSCTP

    The invention of mobile devices such as laptops, hand-held computers, and cellular phones has changed the whole Internet world. The main feature of mobile devices is that they can access the Internet wirelessly by different air interfaces using different technologies while roaming. This makes mobile devices become increasingly popular. However,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Network Based Worm Infection and Detection

    Self-duplicating, self-propagating malicious codes known as computer worms spread themselves without any human interaction and launch the most destructive attacks against computer networks. In this paper, the authors have successfully detected the worm propagation characteristics of different and using permutation scanning to find the worms using branch process model to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Adaptive Multi-Path Link Quality Routing Protocol for Mobile Ad-Hoc Network

    Mobile Ad Hoc NETwork (MANET) is a collection of mobile nodes interconnected by wireless media. Routing protocols for Wireless ad hoc networks have traditionally focused on finding paths with different link quality metrics such as minimum hop count, RSSI (Received Signal Strength Indication), SNR (Signal-to-Noise Ratio), BER (Bit Error Rate)....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Very Fast Elliptic Curve Cryptography Public-Key Generator on Koblitz Curves

    This paper presents Xilinx vertex-5 FPGA-based very fast elliptic curve cryptography public key generator on Koblitz curves targeting for applications requiring high speed. The generator supports both fast computation of point multiplication using window method and multiple point multiplications with joint sparse form representations. In order to achieve better performance,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus Like Environment

    With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to make such a system. The primary issues of element management are taken into consideration in this paper and the main...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Fax Over IP Using T.38 Over SIP

    Facsimile (fax) transmission is very important to the world of business. In a world where a significant percentage of long distance Public Switched Telephone Network (PSTN) traffic is composed of fax, great savings in toll charges are possible by utilizing IP networks instead. This paper is a brief survey on...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issues in Distributed Multihop WiMAX Networks

    In this paper, the authors study the existing standards in multihop WiMAX networks and their security issues. For secured communications, it is necessary to have hop-by-hop authentication for any multihop wireless networks. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Reducing Message Overhead in On-Demand Mesh Based Multicast Routing Protocols

    In wireless networks, due to limited battery power, it is crucial to reduce the transmission overhead and power consumption. In this paper, the authors discuss how to achieve low transmission overhead and reduced power consumption by minimizing the transmission of redundant control messages. The popular on-demand multicast routing protocols like...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Modular Approach for Intrusion Detection System in Wireless Networks

    The increasing reliance upon wireless networks has put tremendous emphasis on wireless network security. Intrusion detection in wireless network has become an indispensable component of any useful wireless network security system, and has recently gained attention in both research and industry communities due to widespread use of Wireless Local Area...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Host-Based Intrusion Detection Against Distributed Denial of Service Attacks

    One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a Distributed Denial-of-Service (DDoS) attack, an attacker may use one computer to attack another computer....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issue of E-Governance

    This is the age of information and technology. There are numerous opportunities for organizations to shape the future by providing efficient services and obtaining a competitive advantage for handling products and services. E-governance refers to application of information technology tools in the administration to provide quick and transparency of information...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Modeling and Performance Analysis of Iburst, Hiperman and GSM

    In this paper, the authors propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. Reducing the bandwidth cost of an Internet Protocol (IP) multicast tree by adaptively selecting the cell and the wireless technology for each mobile host to join the multicast group. The mechanism enables more mobile hosts, leads...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    On Demand Routing Protocols in Manet

    A Mobile Ad Hoc NETwork (MANET) is a network consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The dynamic topology of a mobile ad hoc network poses a real challenge in the design of a MANET routing protocol. Over...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Evaluation of Various Routing Protocols Used in Manet

    A Mobile Ad-hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers connected wirelessly. MANET may operate in a standalone fashion, or may be connected to the larger Internet. Many routing protocols have been developed for MANETs over the past few years....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Computer Based Audio Steganography

    People use cryptography to send secret messages to one another without a third party overseeing the message. Steganography is a type of cryptography in which the secret message is hidden in another message. In this paper, a method of hiding the speech signal inside a music file using LSB coding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Approach for Geographic Routing Using Virtual Coordinates for WMN

    Several routing algorithms that exploit geographic information (e.g., GPSR) have been proposed. These algorithms refer to the nodes by their location, not address, and use this information to route greedily, when possible, towards the destination. However, there are many situations where location information is not available at the nodes, and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Space Time Block Codes: An Overview

    The demand for mobile communication systems with high data rates has dramatically increased in recent years. New methods are necessary in order to satisfy this huge communications demand, exploiting the limited resources such as bandwidth and power as efficient as possible. In wireless communication systems, multiple antennas when used with...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Aug 2011

    Parameters Effecting Mobile Number Portability and Fuzzy Logic Based MNP Decision

    Mobile Number Portability (MNP) means that a subscriber of one telecommunication operator is able to keep his telephone number unchanged when switching to another operator. As one of the development trends of the international telecommunication industry, number portability has been introduced in many countries around the world and has played...

    Provided By Universal Association of Computer and Electronics Engineers