Universal Association of Computer and Electronics Engineers

Displaying 1-40 of 88 results

  • White Papers // May 2012

    IP Camera and Mobile Based Remote Login Intrusion Detection

    Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. When a user of an information system takes an action...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Ethnography a Research Method in Software Process Improvements

    Software process improvements are required to increase the productivity of software companies. Generally, it is the aim to increase the quality of the produced software and to keep budget and time. Quality models for software process improvements were developed in context of large organisations and multi-national companies. In this paper,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Analysis of FIR Filter in Frequency Domain and Time Domain for Wireless Communication System

    This Paper gives design the methodology for implementation of FIR filter in the frequency domain and time domain. The filter coefficients for these two implementation are taken by sampling the time representation and frequency representation of RRC filter. The RRC filter transfer function is used to obtain Raised Cosine filter...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Case for Raid

    Mathematicians agree that omniscient communication is an interesting new topic in the field of theory, and steganographers concur. The authors' aim here is to set the record straight. Given the current status of decentralized technology, biologists particularly desire the evaluation of context-free grammar. In this paper, they use empathic symmetries...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Simulation Based Analysis of Position Based Routing Protocols in Vehicular Ad Hoc Networks

    The Vehicular Ad Hoc NETwork (VANET) is a promising new paradigm in the domain of wireless communication employed specially for providing road safety, comfort and convenience to the driver as well as passengers while on the way by the integration of various wireless network technologies, cellular technologies like 2G and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Multiple Channel Implementations in Wireless Mesh Networks

    The much research progress has been made in network capacity analysis of ad-hoc networks, WMNs have not been fully explored due to the difference between WMNs and ad-hoc networks. The result about network capacity and optimum node density of ad-hoc networks may not directly be applied to the WMNs because...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Design of Stepped-Impedance Microstrip Line Low Pass Filter for Wireless Communication

    Filters play an important role in microwave applications. Microwave systems have an enormous impact on modern society. Applications are diverse, from entertainment via satellite television, to civil and military radar system. In particular, the recent trend of multi-frequency bands and multifunction operations in wireless communication systems along with the explosion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Various Key Exchanging Algorithms

    The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Security Threats

    Cloud is a fundamental shift in the IT architecture, which is why there's a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Energy Efficient Routing Protocol Using Clustering Technique

    The past few years have witnessed increased interest in the potential use of Wireless Sensor Networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    DDOS Mitigation Techniques-A Survey

    Distributed Denial of Service (DDOS) attacks are one of the most widely spread problems faced by most of the Internet Service Providers (ISP's) today. Mitigation of these attacks has gained utmost importance in the present scenario. A number of mitigation techniques have been proposed by various researchers. The authors enable...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Digital Watermarking: Current Status and Key Issues

    Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Clustering Protocol Based on Tree Routing Algorithm in Wireless Sensor Networks (WSNs)

    In today's world Wireless Sensor Networks (WSNs) are an emerging technology for monitoring physical environment. WSNs consist of small nodes with sensing, computation and wireless communications capabilities. These sensor nodes are constrained in energy supply, processing and storage. Such constraints combined with a typical deployment of large number of sensor...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Analysis of Enhanced AODV and AODV for Mobile Ad-Hoc Network

    A Mobile Ad hoc NETwork (MANET) is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Secure Communication of Wireless Sensor Network (WSN) Using Coding Theory

    Several schemes to establish secret key between sensor nodes in wireless sensor network for secure communication has been proposed. But due to lack of priori deployment knowledge and limited resources of sensor nodes and security threats, it is always challenging to propose a better scheme apart from existing. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Is the Primary Goal for Designing a WSN

    The authors are aware that the power limitation is a critical issue for the sensor nodes, so different scheme or algorithm was proposed to implement the routing protocols to expand the minimum power utilize the maximum work. But it is unfortunate that most of them are not security concerned. As...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Machine Learning Based Anomaly Detection Techniques for Network Intrusion Detection Systems

    Intrusion Detection Systems (IDSs) are an important component of defensive measures protecting computer systems and networks from abuse. Due to the rising complexity and volume of the attacks in the network, Network Intrusion detection systems are preferred over Host based Intrusion detection systems. NIDS are categorized as misuse network intrusion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Application of LZW Technique for ECG Data Compression

    The ECG is an electronic method of recording the heart beat of the patient. The characteristic of heart beat is determined by PQRST curve. By attaching additional leads while recording ECG signals they require higher sampling rates and finer amplitude resolution, for non-cardiac signals such as blood pressure and respiration...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Securing e-Commerce Application Against Various Vulnerability

    The use of internet is increasing rapidly and as the role of e-commerce application is also increases some of these application are quite secure and some of them are unsecure many vulnerability can easily exploit them .Security measure are not effective. And in order to protect these e-commerce application many...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Optimal Implementation of Digital Steganography in an Image for the Secret Communication

    A real-life requirement motivated this case study of secure covert communication. Steganography is a technique used to transfer hidden information in an imperceptible manner. The authors proposed a novel approach of substitution technique of image steganography. The proposed method is completely flexible on size of secret message bits and allows...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Block Truncation Coding With EBTC

    This comparison paper scrutinizes image compression using Block Truncation Coding. Many algorithms were selected likely the original Block Truncation coding, Absolute Moment Block Truncation Coding, a comparison survey was executed. These above techniques are divided image into non overlapping blocks. The authors distinguish in the direction of choosing the quantization...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Tracking and Controlling Object Oriented Software Progress

    There are many ways to look at a problem to be solved using a software-based solution. One widely used approach to problem solving takes an object-oriented viewpoint. The definition of objects encompasses a description of attributes, behaviors, operations, and messages. An object encapsulates both data and the processing that is...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Network Security Evaluation Based on Information Security

    The Network security Evaluation is a development of computer and network hot issue in present research of Network technology brings them convenience together security. After acquiring each host's web-based threat exists everywhere, and to attack. Therefore, study and evaluation of the network security will be important practical significance: finding out...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Framing Sequence Algorithms in Netsim

    NetSim is a network simulation tool used by the academic community for teaching. The Data Link Layer deals with the algorithms for achieving reliable, efficient communication between two adjacent machines above the physical layer. Framing is a Protocol Data Unit (PDU) for data link layer is often called a frame...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Longitudinal Redundancy Check and Cyclic Redundancy Check Algorithms Using Netsim

    Network Simulation is a comprehensive tool for studying computer networks. NetSim features state of the art network simulation technology, and comes with additional offerings that enhance and quicken learning. NetSim is an educational network simulator and provides educators with a comprehensive and effective means of teaching computer networks. The software...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Hiding Information by Using Image Steganography

    Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Intrusion Detection and Prevention System

    As the importance of computers are increasingly integrated into the systems the ability to detect intruders in computer systems also increases as the authors rely on for the correct functioning of society. Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. The process...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Novel Call Admission Control Scheme for Multimedia Traffic in IEEE 802.16e OFDMA Systems

    IEEE 802.16e Broadband Wireless Access (BWA) technology is one of the most promising technologies for broadband access and has many applications. In order to meet the requirements of diverse multimedia services, it is necessary to provide Quality of Service (QoS) guarantee. Call Admission control plays an important role in QoS...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Architecture: Noise Pollution Monitor Through Wireless Sensor Network

    The area of wireless sensor network is wide & there are various kinds of sensor devices are used in mobile applications. Sensors monitor the environmental activities like air pollution, noise level, water level, greenhouse monitoring, agriculture monitor etc which grows & generates greater interest & becomes a challenge for finding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security and Privacy Enabling Lightweight Solution for Vehicular Networks

    Vehicular Ad-Hoc NETwork (VANET) is an emerging area of wireless networks which allows vehicles to communicate enabling Intelligent Transportation System (ITS). Immense amount of research is going on both by industry and academia. In vehicular communication there occurs frequent handover because of the high speed of vehicles and hence there...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effective Data Mining Techniques for Intrusion Detection and Prevention System

    The main purpose of Intrusion Detection Systems (IDS) and Intrusion protection Systems (IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Review of Routing and Switching

    The computer network are playing an important role in providing services to large organization as well as to individual person. A network is a group of interconnected computers that allows to share information and resources (such as printers) from one computer to another. A network with the right software helps...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Services for Converged IP Networks

    Rapid growth of computer network leading to converging necessitates management of servers by a server. Simple Network Management Protocol (SNMP) based management cannot be used for the converged network management due to its limitations and relatively simple monitoring. Therefore, alternative technologies are required to meet various goals such as scalability,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Simulation Based Analysis of Position Based Routing Protocols in Vehicular Ad Hoc Networks

    The Vehicular Ad Hoc NETwork (VANET) is a promising new paradigm in the domain of wireless communication employed specially for providing road safety, comfort and convenience to the driver as well as passengers while on the way by the integration of various wireless network technologies, cellular technologies like 2G and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Multiple Channel Implementations in Wireless Mesh Networks

    The much research progress has been made in network capacity analysis of ad-hoc networks, WMNs have not been fully explored due to the difference between WMNs and ad-hoc networks. The result about network capacity and optimum node density of ad-hoc networks may not directly be applied to the WMNs because...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Design of Stepped-Impedance Microstrip Line Low Pass Filter for Wireless Communication

    Filters play an important role in microwave applications. Microwave systems have an enormous impact on modern society. Applications are diverse, from entertainment via satellite television, to civil and military radar system. In particular, the recent trend of multi-frequency bands and multifunction operations in wireless communication systems along with the explosion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Various Key Exchanging Algorithms

    The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Security Threats

    Cloud is a fundamental shift in the IT architecture, which is why there's a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Energy Efficient Routing Protocol Using Clustering Technique

    The past few years have witnessed increased interest in the potential use of Wireless Sensor Networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Network Security Evaluation Based on Information Security

    The Network security Evaluation is a development of computer and network hot issue in present research of Network technology brings them convenience together security. After acquiring each host's web-based threat exists everywhere, and to attack. Therefore, study and evaluation of the network security will be important practical significance: finding out...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Framing Sequence Algorithms in Netsim

    NetSim is a network simulation tool used by the academic community for teaching. The Data Link Layer deals with the algorithms for achieving reliable, efficient communication between two adjacent machines above the physical layer. Framing is a Protocol Data Unit (PDU) for data link layer is often called a frame...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Longitudinal Redundancy Check and Cyclic Redundancy Check Algorithms Using Netsim

    Network Simulation is a comprehensive tool for studying computer networks. NetSim features state of the art network simulation technology, and comes with additional offerings that enhance and quicken learning. NetSim is an educational network simulator and provides educators with a comprehensive and effective means of teaching computer networks. The software...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Hiding Information by Using Image Steganography

    Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Intrusion Detection and Prevention System

    As the importance of computers are increasingly integrated into the systems the ability to detect intruders in computer systems also increases as the authors rely on for the correct functioning of society. Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. The process...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Novel Call Admission Control Scheme for Multimedia Traffic in IEEE 802.16e OFDMA Systems

    IEEE 802.16e Broadband Wireless Access (BWA) technology is one of the most promising technologies for broadband access and has many applications. In order to meet the requirements of diverse multimedia services, it is necessary to provide Quality of Service (QoS) guarantee. Call Admission control plays an important role in QoS...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Architecture: Noise Pollution Monitor Through Wireless Sensor Network

    The area of wireless sensor network is wide & there are various kinds of sensor devices are used in mobile applications. Sensors monitor the environmental activities like air pollution, noise level, water level, greenhouse monitoring, agriculture monitor etc which grows & generates greater interest & becomes a challenge for finding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security and Privacy Enabling Lightweight Solution for Vehicular Networks

    Vehicular Ad-Hoc NETwork (VANET) is an emerging area of wireless networks which allows vehicles to communicate enabling Intelligent Transportation System (ITS). Immense amount of research is going on both by industry and academia. In vehicular communication there occurs frequent handover because of the high speed of vehicles and hence there...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effective Data Mining Techniques for Intrusion Detection and Prevention System

    The main purpose of Intrusion Detection Systems (IDS) and Intrusion protection Systems (IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Review of Routing and Switching

    The computer network are playing an important role in providing services to large organization as well as to individual person. A network is a group of interconnected computers that allows to share information and resources (such as printers) from one computer to another. A network with the right software helps...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Services for Converged IP Networks

    Rapid growth of computer network leading to converging necessitates management of servers by a server. Simple Network Management Protocol (SNMP) based management cannot be used for the converged network management due to its limitations and relatively simple monitoring. Therefore, alternative technologies are required to meet various goals such as scalability,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2011

    Communication in Parallel and Distributed Systems

    Communication is an essential part of distributed computing and parallel computing. There exist many topologies, network architectures and routing schemas for such type of communication. In this paper, the authors will review a few selected network architectures and routing schemes, which are continually going through evolution process. Parallel and distributed...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Approach for Geographic Routing Using Virtual Coordinates for WMN

    Several routing algorithms that exploit geographic information (e.g., GPSR) have been proposed. These algorithms refer to the nodes by their location, not address, and use this information to route greedily, when possible, towards the destination. However, there are many situations where location information is not available at the nodes, and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Space Time Block Codes: An Overview

    The demand for mobile communication systems with high data rates has dramatically increased in recent years. New methods are necessary in order to satisfy this huge communications demand, exploiting the limited resources such as bandwidth and power as efficient as possible. In wireless communication systems, multiple antennas when used with...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Aug 2011

    Parameters Effecting Mobile Number Portability and Fuzzy Logic Based MNP Decision

    Mobile Number Portability (MNP) means that a subscriber of one telecommunication operator is able to keep his telephone number unchanged when switching to another operator. As one of the development trends of the international telecommunication industry, number portability has been introduced in many countries around the world and has played...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Implementation Issues and What to Compute on Cloud

    The development of worldwide networks, open systems and new technology trends a new type of computing where computational power is provided similar to utilities like water, gas or electricity. Cloud computing refers to the concept of grid computing, utility computing and virtualization. It elevates knowledge management to newer heights by...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effect of CWND and RTO in the Performance of Wireless Networks

    In this paper, the authors describe a ns based simulation analysis of TCP performance over a hybrid network with first link as a wireless link. The latter choice is for understanding performance issues with better clarity. The effect of wireless errors on different TCP parameters resulted into end to end...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Trusted Agent-Based On-Demand Routing Protocol in MANET

    Ad-hoc wireless networks are self-organising, infrastructure less networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communicate with each other through radio links in multihop specified routing protocols. The concept of agent is introduced in MANET to reduce the load on node...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    The Economic Perspective of Cloud Computing

    Cloud computing is an innovative, emerging and a novel phenomenon that paves the way for provisioning of infinitely scalable, re-usable, multipurpose, flexible, cost-saving, efficient and customizable on-demand information technology services and products. The promise of cloud computing is to deliver all the functionality of existing information technology services (and in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementing Video Data Compression Along With Network Coding in Video Multicast

    This paper presents a technical review to real time Video Multicast. In this paper Video Multicast technique is being described and to improve the quality and efficiency using network coding and video data compression. Video data compression is concerned with reducing the amount of data required to reproduce a digital...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) can be described as a collection of untethered sensor nodes. An important application of WSN is in the field of real-time communication. Real-time communication is a critical service which requires a qualitative routing protocol for energy-efficient network communication. The judicious use of energy of the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus Like Environment

    With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to make such a system. The primary issues of element management are taken into consideration in this paper and the main...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Fax Over IP Using T.38 Over SIP

    Facsimile (fax) transmission is very important to the world of business. In a world where a significant percentage of long distance Public Switched Telephone Network (PSTN) traffic is composed of fax, great savings in toll charges are possible by utilizing IP networks instead. This paper is a brief survey on...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issues in Distributed Multihop WiMAX Networks

    In this paper, the authors study the existing standards in multihop WiMAX networks and their security issues. For secured communications, it is necessary to have hop-by-hop authentication for any multihop wireless networks. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Reducing Message Overhead in On-Demand Mesh Based Multicast Routing Protocols

    In wireless networks, due to limited battery power, it is crucial to reduce the transmission overhead and power consumption. In this paper, the authors discuss how to achieve low transmission overhead and reduced power consumption by minimizing the transmission of redundant control messages. The popular on-demand multicast routing protocols like...

    Provided By Universal Association of Computer and Electronics Engineers