Universal Association of Computer and Electronics Engineers

Displaying 41-80 of 87 results

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Implementation Issues and What to Compute on Cloud

    The development of worldwide networks, open systems and new technology trends a new type of computing where computational power is provided similar to utilities like water, gas or electricity. Cloud computing refers to the concept of grid computing, utility computing and virtualization. It elevates knowledge management to newer heights by...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effect of CWND and RTO in the Performance of Wireless Networks

    In this paper, the authors describe a ns based simulation analysis of TCP performance over a hybrid network with first link as a wireless link. The latter choice is for understanding performance issues with better clarity. The effect of wireless errors on different TCP parameters resulted into end to end...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Trusted Agent-Based On-Demand Routing Protocol in MANET

    Ad-hoc wireless networks are self-organising, infrastructure less networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communicate with each other through radio links in multihop specified routing protocols. The concept of agent is introduced in MANET to reduce the load on node...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    The Economic Perspective of Cloud Computing

    Cloud computing is an innovative, emerging and a novel phenomenon that paves the way for provisioning of infinitely scalable, re-usable, multipurpose, flexible, cost-saving, efficient and customizable on-demand information technology services and products. The promise of cloud computing is to deliver all the functionality of existing information technology services (and in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementing Video Data Compression Along With Network Coding in Video Multicast

    This paper presents a technical review to real time Video Multicast. In this paper Video Multicast technique is being described and to improve the quality and efficiency using network coding and video data compression. Video data compression is concerned with reducing the amount of data required to reproduce a digital...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) can be described as a collection of untethered sensor nodes. An important application of WSN is in the field of real-time communication. Real-time communication is a critical service which requires a qualitative routing protocol for energy-efficient network communication. The judicious use of energy of the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Very Fast Elliptic Curve Cryptography Public-Key Generator on Koblitz Curves

    This paper presents Xilinx vertex-5 FPGA-based very fast elliptic curve cryptography public key generator on Koblitz curves targeting for applications requiring high speed. The generator supports both fast computation of point multiplication using window method and multiple point multiplications with joint sparse form representations. In order to achieve better performance,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus Like Environment

    With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to make such a system. The primary issues of element management are taken into consideration in this paper and the main...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Fax Over IP Using T.38 Over SIP

    Facsimile (fax) transmission is very important to the world of business. In a world where a significant percentage of long distance Public Switched Telephone Network (PSTN) traffic is composed of fax, great savings in toll charges are possible by utilizing IP networks instead. This paper is a brief survey on...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issues in Distributed Multihop WiMAX Networks

    In this paper, the authors study the existing standards in multihop WiMAX networks and their security issues. For secured communications, it is necessary to have hop-by-hop authentication for any multihop wireless networks. WiMAX multihop networks provide default hop-by-hop authentication in a distributed security mode only. Apart from this, the multihop...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Reducing Message Overhead in On-Demand Mesh Based Multicast Routing Protocols

    In wireless networks, due to limited battery power, it is crucial to reduce the transmission overhead and power consumption. In this paper, the authors discuss how to achieve low transmission overhead and reduced power consumption by minimizing the transmission of redundant control messages. The popular on-demand multicast routing protocols like...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Modular Approach for Intrusion Detection System in Wireless Networks

    The increasing reliance upon wireless networks has put tremendous emphasis on wireless network security. Intrusion detection in wireless network has become an indispensable component of any useful wireless network security system, and has recently gained attention in both research and industry communities due to widespread use of Wireless Local Area...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Host-Based Intrusion Detection Against Distributed Denial of Service Attacks

    One of the greatest threats that network security faces nowadays is Distributed Denial of Service attacks. A newer version of the Denial of Service attack, also called Distributed Denial of Service attack or DDoS. In a Distributed Denial-of-Service (DDoS) attack, an attacker may use one computer to attack another computer....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Issue of E-Governance

    This is the age of information and technology. There are numerous opportunities for organizations to shape the future by providing efficient services and obtaining a competitive advantage for handling products and services. E-governance refers to application of information technology tools in the administration to provide quick and transparency of information...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Modeling and Performance Analysis of Iburst, Hiperman and GSM

    In this paper, the authors propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. Reducing the bandwidth cost of an Internet Protocol (IP) multicast tree by adaptively selecting the cell and the wireless technology for each mobile host to join the multicast group. The mechanism enables more mobile hosts, leads...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    On Demand Routing Protocols in Manet

    A Mobile Ad Hoc NETwork (MANET) is a network consisting of a set of mobile hosts capable of communicating with each other without the assistance of base stations. The dynamic topology of a mobile ad hoc network poses a real challenge in the design of a MANET routing protocol. Over...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Transaction Security of Mobile Payments Using IMEI Number and Call Back Technique

    In recent years, on-demand routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency. There exist many on-demand routing protocols for Mobile Ad hoc NETworks (MANETS). Most of the protocols, however, use a single route and do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Multiple Routing Algorithm for Wireless Ad Hoc Network

    In recent years, on-demand routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency. There exist many on-demand routing protocols for Mobile Ad hoc NETworks (MANETS). Most of the protocols, however, use a single route and do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Development of Wireless Sensor Network (WSN) for Remote Monitoring of Illegal Cutting Trees in Forest

    Wireless Sensor Networks (WSNs) have been emerging as one of the most promising research areas in recent years and are widely recognized as powerful means for in situ observations of events and environments over long period of time. The wide spectrum of WSNs can offer application such as environment and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Efficient Firewall Designing Using Ant Colony Optimization and Hierarchical Distribution

    A firewall is a security guard placed at the point of entry between a private network and the outside Internet such that all incoming and outgoing packets have to pass through it. The function of a firewall is to examine every incoming or outgoing packet. Here the paper aims to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Mobile Telephony Communication Using WIFI P2P

    The purpose of this paper is to design and implement a telephony program that uses Wi-Fi using Peer-to-Peer communication between mobile phones without any cost. The system will allow users to search for other individuals within the Wi-Fi range and to establish free P2P voice connections, or to establish virtual...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Web Server Optimization: A DNS Based Approach

    A group of web-server system can be deployed to support high request rate. The Domain Name System (DNS) servers act as a mediator between the client and web-servers. It dispatches the client request among the web-servers through the URL-name to IP-address mapping mechanism. In this paper, the authors propose a...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Wireless Sensor Embedded Steering Wheel for Real Time Monitoring of Driver Fatigue Detection

    Accidents due to drowsy driving have shown a steep increase in the past decade. An efficient safety measure is required to mitigate the impact of accidents. This paper details the system architecture for real-time, non-obstructive, automatic detection and alarming for driver drowsiness. Data/sensor fusion technology incorporated with the system monitors...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    A Security Mechanism for Remote Monitoring System Security Using Smartphone

    This paper proposes a security mechanism for remote monitoring system through a combination between user's password and random number by using SMS service over 3G networks. By using random number and phone number, this mechanism is not only able to provide robust security from replay attack and dictionary attack but...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Reliable Protection Scheme Against Cooperative Black Hole Attack in MANET

    Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Black Hole Attack against network integrity...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Improvement Authentication of Routing Protocols for Mobile Ad Hoc Networks

    Ad Hoc network Consist of mobile hosts (or nodes) which communicate with other nodes through wireless medium without any fixed infrastructure. Dynamic network topology: the mobile nodes are free to move randomly and organize themselves arbitrarily the wireless links in this network are highly error prone and can do down...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    A Scheme of Detection and Prevention Rogue AP Using Comparison Security Condition of AP

    Rogue Access Points (RAPs) cause serious security threats to wireless networks. To detect RAPs, the authors propose a novel user-oriented framework based on security condition. AP's security condition which includes cipher and authentication type has been specified by the vendors. So, it is difficult to be faked when authentication type...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    RC4: An Analysis With Respect to Randomness

    The paper aims to study one of the most widely used stream cipher, RC4. The bytes generated by the Psedo Random Generator Algorithm (PRGA) of RC4 are evaluated to check the randomness. Some widely known and accepted statistical measures are applied for this purpose. This is then followed by modifying...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Review of Short Messaging Service Security

    Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitive information between the business and its...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Analyzing the Effect of Playout Buffer Adjustment on Voice Quality for VoIP Based Social-Network Applications

    Social networks are making the dream of real time group communication a reality. Voice over Internet Protocol (VoIP)based social network applications are becoming popular but are also suffering from Quality of Service (QoS) and Quality of Experience (QoE) issues. In order to add to its popularity and reliance VoIP based...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Seamless Handover Between CDMA2000 and 802.11 WLAN Using MSCTP

    The invention of mobile devices such as laptops, hand-held computers, and cellular phones has changed the whole Internet world. The main feature of mobile devices is that they can access the Internet wirelessly by different air interfaces using different technologies while roaming. This makes mobile devices become increasingly popular. However,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Performance Comparision of LEACH, SEP and DEEC Protocol in Wireless Sensor Network

    Wireless Sensor Network is the network of power-limited sensing devices called sensors. Wireless sensor network is differ from other networks in terms of optimization of amount of energy because when these sensors sense and transmit data to other sensors present in the network, considerable amount of energy is dissipated. Various...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Various Key Exchanging Algorithms

    The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Security Threats

    Cloud is a fundamental shift in the IT architecture, which is why there's a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Energy Efficient Routing Protocol Using Clustering Technique

    The past few years have witnessed increased interest in the potential use of Wireless Sensor Networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Network Security Evaluation Based on Information Security

    The Network security Evaluation is a development of computer and network hot issue in present research of Network technology brings them convenience together security. After acquiring each host's web-based threat exists everywhere, and to attack. Therefore, study and evaluation of the network security will be important practical significance: finding out...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Framing Sequence Algorithms in Netsim

    NetSim is a network simulation tool used by the academic community for teaching. The Data Link Layer deals with the algorithms for achieving reliable, efficient communication between two adjacent machines above the physical layer. Framing is a Protocol Data Unit (PDU) for data link layer is often called a frame...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Longitudinal Redundancy Check and Cyclic Redundancy Check Algorithms Using Netsim

    Network Simulation is a comprehensive tool for studying computer networks. NetSim features state of the art network simulation technology, and comes with additional offerings that enhance and quicken learning. NetSim is an educational network simulator and provides educators with a comprehensive and effective means of teaching computer networks. The software...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Hiding Information by Using Image Steganography

    Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Intrusion Detection and Prevention System

    As the importance of computers are increasingly integrated into the systems the ability to detect intruders in computer systems also increases as the authors rely on for the correct functioning of society. Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. The process...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Novel Call Admission Control Scheme for Multimedia Traffic in IEEE 802.16e OFDMA Systems

    IEEE 802.16e Broadband Wireless Access (BWA) technology is one of the most promising technologies for broadband access and has many applications. In order to meet the requirements of diverse multimedia services, it is necessary to provide Quality of Service (QoS) guarantee. Call Admission control plays an important role in QoS...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Architecture: Noise Pollution Monitor Through Wireless Sensor Network

    The area of wireless sensor network is wide & there are various kinds of sensor devices are used in mobile applications. Sensors monitor the environmental activities like air pollution, noise level, water level, greenhouse monitoring, agriculture monitor etc which grows & generates greater interest & becomes a challenge for finding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security and Privacy Enabling Lightweight Solution for Vehicular Networks

    Vehicular Ad-Hoc NETwork (VANET) is an emerging area of wireless networks which allows vehicles to communicate enabling Intelligent Transportation System (ITS). Immense amount of research is going on both by industry and academia. In vehicular communication there occurs frequent handover because of the high speed of vehicles and hence there...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effective Data Mining Techniques for Intrusion Detection and Prevention System

    The main purpose of Intrusion Detection Systems (IDS) and Intrusion protection Systems (IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Review of Routing and Switching

    The computer network are playing an important role in providing services to large organization as well as to individual person. A network is a group of interconnected computers that allows to share information and resources (such as printers) from one computer to another. A network with the right software helps...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Services for Converged IP Networks

    Rapid growth of computer network leading to converging necessitates management of servers by a server. Simple Network Management Protocol (SNMP) based management cannot be used for the converged network management due to its limitations and relatively simple monitoring. Therefore, alternative technologies are required to meet various goals such as scalability,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2011

    Communication in Parallel and Distributed Systems

    Communication is an essential part of distributed computing and parallel computing. There exist many topologies, network architectures and routing schemas for such type of communication. In this paper, the authors will review a few selected network architectures and routing schemes, which are continually going through evolution process. Parallel and distributed...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    DDOS Mitigation Techniques-A Survey

    Distributed Denial of Service (DDOS) attacks are one of the most widely spread problems faced by most of the Internet Service Providers (ISP's) today. Mitigation of these attacks has gained utmost importance in the present scenario. A number of mitigation techniques have been proposed by various researchers. The authors enable...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Digital Watermarking: Current Status and Key Issues

    Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Evaluation of Various Routing Protocols Used in Manet

    A Mobile Ad-hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers connected wirelessly. MANET may operate in a standalone fashion, or may be connected to the larger Internet. Many routing protocols have been developed for MANETs over the past few years....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Computer Based Audio Steganography

    People use cryptography to send secret messages to one another without a third party overseeing the message. Steganography is a type of cryptography in which the secret message is hidden in another message. In this paper, a method of hiding the speech signal inside a music file using LSB coding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Capacity Analysis of MIMO Systems

    Multiple-Input Multiple-Output (MIMO) Systems are used in wireless communication for enhancement of capacity. The main aim of this paper is to carry out investigations of MIMO system capacity and to observe the performance of MIMO system by using Water filling Algorithm. In which Diversity gain and spatial multiplexing gain are...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Approach for Geographic Routing Using Virtual Coordinates for WMN

    Several routing algorithms that exploit geographic information (e.g., GPSR) have been proposed. These algorithms refer to the nodes by their location, not address, and use this information to route greedily, when possible, towards the destination. However, there are many situations where location information is not available at the nodes, and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Space Time Block Codes: An Overview

    The demand for mobile communication systems with high data rates has dramatically increased in recent years. New methods are necessary in order to satisfy this huge communications demand, exploiting the limited resources such as bandwidth and power as efficient as possible. In wireless communication systems, multiple antennas when used with...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effects of Hidden Terminals and their Alleviation in Multi Rate Ad Hoc Networks

    In multi rate ad hoc networks the hidden terminal problem is unique and there is a limited understanding of its effect on network performance. In this paper, the authors studied the effects of hidden terminals in multi rate mobile ad hoc networks environments. In IEEE 802.11 base WLANs only the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Event Based Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs)

    Sensor nodes that are deployed in the wireless sensor field are equipped with limited energy power. The most important problem in the wireless sensor network is to develop the energy efficient, reliable and robust routing protocol. To achieve these targets, the authors have proposed a new Event-Based Energy Efficient Routing...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Aug 2011

    Parameters Effecting Mobile Number Portability and Fuzzy Logic Based MNP Decision

    Mobile Number Portability (MNP) means that a subscriber of one telecommunication operator is able to keep his telephone number unchanged when switching to another operator. As one of the development trends of the international telecommunication industry, number portability has been introduced in many countries around the world and has played...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Implementation Issues and What to Compute on Cloud

    The development of worldwide networks, open systems and new technology trends a new type of computing where computational power is provided similar to utilities like water, gas or electricity. Cloud computing refers to the concept of grid computing, utility computing and virtualization. It elevates knowledge management to newer heights by...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effect of CWND and RTO in the Performance of Wireless Networks

    In this paper, the authors describe a ns based simulation analysis of TCP performance over a hybrid network with first link as a wireless link. The latter choice is for understanding performance issues with better clarity. The effect of wireless errors on different TCP parameters resulted into end to end...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Trusted Agent-Based On-Demand Routing Protocol in MANET

    Ad-hoc wireless networks are self-organising, infrastructure less networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communicate with each other through radio links in multihop specified routing protocols. The concept of agent is introduced in MANET to reduce the load on node...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    The Economic Perspective of Cloud Computing

    Cloud computing is an innovative, emerging and a novel phenomenon that paves the way for provisioning of infinitely scalable, re-usable, multipurpose, flexible, cost-saving, efficient and customizable on-demand information technology services and products. The promise of cloud computing is to deliver all the functionality of existing information technology services (and in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementing Video Data Compression Along With Network Coding in Video Multicast

    This paper presents a technical review to real time Video Multicast. In this paper Video Multicast technique is being described and to improve the quality and efficiency using network coding and video data compression. Video data compression is concerned with reducing the amount of data required to reproduce a digital...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) can be described as a collection of untethered sensor nodes. An important application of WSN is in the field of real-time communication. Real-time communication is a critical service which requires a qualitative routing protocol for energy-efficient network communication. The judicious use of energy of the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Very Fast Elliptic Curve Cryptography Public-Key Generator on Koblitz Curves

    This paper presents Xilinx vertex-5 FPGA-based very fast elliptic curve cryptography public key generator on Koblitz curves targeting for applications requiring high speed. The generator supports both fast computation of point multiplication using window method and multiple point multiplications with joint sparse form representations. In order to achieve better performance,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    An Efficient and Cost-Effective Approach to Manage Network Elements in a Campus Like Environment

    With the changing trends and new developments, designing an Element Management System (EMS) for efficient management of network elements is a challenging task. Therefore, a good design is essential to make such a system. The primary issues of element management are taken into consideration in this paper and the main...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Fax Over IP Using T.38 Over SIP

    Facsimile (fax) transmission is very important to the world of business. In a world where a significant percentage of long distance Public Switched Telephone Network (PSTN) traffic is composed of fax, great savings in toll charges are possible by utilizing IP networks instead. This paper is a brief survey on...

    Provided By Universal Association of Computer and Electronics Engineers