Universal Association of Computer and Electronics Engineers

Displaying 41-80 of 87 results

  • White Papers // May 2012

    IP Camera and Mobile Based Remote Login Intrusion Detection

    Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. When a user of an information system takes an action...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Ethnography a Research Method in Software Process Improvements

    Software process improvements are required to increase the productivity of software companies. Generally, it is the aim to increase the quality of the produced software and to keep budget and time. Quality models for software process improvements were developed in context of large organisations and multi-national companies. In this paper,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Analysis of FIR Filter in Frequency Domain and Time Domain for Wireless Communication System

    This Paper gives design the methodology for implementation of FIR filter in the frequency domain and time domain. The filter coefficients for these two implementation are taken by sampling the time representation and frequency representation of RRC filter. The RRC filter transfer function is used to obtain Raised Cosine filter...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Case for Raid

    Mathematicians agree that omniscient communication is an interesting new topic in the field of theory, and steganographers concur. The authors' aim here is to set the record straight. Given the current status of decentralized technology, biologists particularly desire the evaluation of context-free grammar. In this paper, they use empathic symmetries...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Simulation Based Analysis of Position Based Routing Protocols in Vehicular Ad Hoc Networks

    The Vehicular Ad Hoc NETwork (VANET) is a promising new paradigm in the domain of wireless communication employed specially for providing road safety, comfort and convenience to the driver as well as passengers while on the way by the integration of various wireless network technologies, cellular technologies like 2G and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Multiple Channel Implementations in Wireless Mesh Networks

    The much research progress has been made in network capacity analysis of ad-hoc networks, WMNs have not been fully explored due to the difference between WMNs and ad-hoc networks. The result about network capacity and optimum node density of ad-hoc networks may not directly be applied to the WMNs because...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Design of Stepped-Impedance Microstrip Line Low Pass Filter for Wireless Communication

    Filters play an important role in microwave applications. Microwave systems have an enormous impact on modern society. Applications are diverse, from entertainment via satellite television, to civil and military radar system. In particular, the recent trend of multi-frequency bands and multifunction operations in wireless communication systems along with the explosion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Various Key Exchanging Algorithms

    The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Security Threats

    Cloud is a fundamental shift in the IT architecture, which is why there's a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Energy Efficient Routing Protocol Using Clustering Technique

    The past few years have witnessed increased interest in the potential use of Wireless Sensor Networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Network Security Evaluation Based on Information Security

    The Network security Evaluation is a development of computer and network hot issue in present research of Network technology brings them convenience together security. After acquiring each host's web-based threat exists everywhere, and to attack. Therefore, study and evaluation of the network security will be important practical significance: finding out...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Framing Sequence Algorithms in Netsim

    NetSim is a network simulation tool used by the academic community for teaching. The Data Link Layer deals with the algorithms for achieving reliable, efficient communication between two adjacent machines above the physical layer. Framing is a Protocol Data Unit (PDU) for data link layer is often called a frame...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Longitudinal Redundancy Check and Cyclic Redundancy Check Algorithms Using Netsim

    Network Simulation is a comprehensive tool for studying computer networks. NetSim features state of the art network simulation technology, and comes with additional offerings that enhance and quicken learning. NetSim is an educational network simulator and provides educators with a comprehensive and effective means of teaching computer networks. The software...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Hiding Information by Using Image Steganography

    Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper method is proposed to provide more security for the key information with the combination of image compression and data encryption method. This method requires less memory space and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Intrusion Detection and Prevention System

    As the importance of computers are increasingly integrated into the systems the ability to detect intruders in computer systems also increases as the authors rely on for the correct functioning of society. Intrusion detection is a mechanism used to detect various attacks on a wired or wireless network. The process...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Novel Call Admission Control Scheme for Multimedia Traffic in IEEE 802.16e OFDMA Systems

    IEEE 802.16e Broadband Wireless Access (BWA) technology is one of the most promising technologies for broadband access and has many applications. In order to meet the requirements of diverse multimedia services, it is necessary to provide Quality of Service (QoS) guarantee. Call Admission control plays an important role in QoS...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Architecture: Noise Pollution Monitor Through Wireless Sensor Network

    The area of wireless sensor network is wide & there are various kinds of sensor devices are used in mobile applications. Sensors monitor the environmental activities like air pollution, noise level, water level, greenhouse monitoring, agriculture monitor etc which grows & generates greater interest & becomes a challenge for finding...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security and Privacy Enabling Lightweight Solution for Vehicular Networks

    Vehicular Ad-Hoc NETwork (VANET) is an emerging area of wireless networks which allows vehicles to communicate enabling Intelligent Transportation System (ITS). Immense amount of research is going on both by industry and academia. In vehicular communication there occurs frequent handover because of the high speed of vehicles and hence there...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effective Data Mining Techniques for Intrusion Detection and Prevention System

    The main purpose of Intrusion Detection Systems (IDS) and Intrusion protection Systems (IPS) for data mining is to discover patterns of program and user activity, and determine what set of events indicate an attack. In the last years, the networking revolution has finally come of age. More than ever before,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Malware Incident Handling

    The paper will be a detailed introduction of malware handling for security professionals. This paper will also serve as a guideline for the reader to perform malware handling by providing definitions, tools to use, and real world demonstration to the reader with enough information to successfully perform malware incident handling....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Controlling Free Riding Using Extended Point Based Incentive Mechanism in Peer-to-Peer Networks

    Over the years of the emergence of peer-to-peer systems a phenomenon named 'Free Riding' has affected its performance and become a serious threat to be resolved. Free riding phenomenon was first felt in the study of Gnutella. As the number of free riders increases, the performance of the overall system...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Security Challenges & Resolutions in Cloud Computing

    Cloud computing is a model to provide on-demand network, software and hardware resources to customers. It provides the infrastructure, storage and virtualization environment to end-users without vendor's interventions. The purpose of cloud computing is to provide as-a-service model to users. Usually Cloud suffers from various levels of risks because essential...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Encryption Mechanism for System-on-Chip Using MiniDES Algorithm With Digital Signature for Secure Communication of Embedded Real Time Applications

    System-on-Chip applications have been widen to various public, private, government and social communication systems for handling security and trust as a systems for mission critical and e-government. Most mission critical and embedded real time applications run on System -on -Chip. SoCs will have limited resources, processing ability and rigid power...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Elliptic Curve Cryptographic Algorithm

    This paper deals with an implementation of Elliptic Curve Cryptography Algorithm. The implementation includes Diffie Hellman Key Exchange and the Digital Signature Algorithm. This paper gives an overview of Elliptic Curve Cryptography algorithm. Cryptography (or cryptology) from Greek word kryptos, "Hidden, secret"; and graph, "Writing" is the practice and study...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Transaction Security of Mobile Payments Using IMEI Number and Call Back Technique

    In recent years, on-demand routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency. There exist many on-demand routing protocols for Mobile Ad hoc NETworks (MANETS). Most of the protocols, however, use a single route and do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Multiple Routing Algorithm for Wireless Ad Hoc Network

    In recent years, on-demand routing protocols have attained more attention in mobile ad hoc networks as compared to other routing schemes due to their abilities and efficiency. There exist many on-demand routing protocols for Mobile Ad hoc NETworks (MANETS). Most of the protocols, however, use a single route and do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Development of Wireless Sensor Network (WSN) for Remote Monitoring of Illegal Cutting Trees in Forest

    Wireless Sensor Networks (WSNs) have been emerging as one of the most promising research areas in recent years and are widely recognized as powerful means for in situ observations of events and environments over long period of time. The wide spectrum of WSNs can offer application such as environment and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Efficient Firewall Designing Using Ant Colony Optimization and Hierarchical Distribution

    A firewall is a security guard placed at the point of entry between a private network and the outside Internet such that all incoming and outgoing packets have to pass through it. The function of a firewall is to examine every incoming or outgoing packet. Here the paper aims to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Mobile Telephony Communication Using WIFI P2P

    The purpose of this paper is to design and implement a telephony program that uses Wi-Fi using Peer-to-Peer communication between mobile phones without any cost. The system will allow users to search for other individuals within the Wi-Fi range and to establish free P2P voice connections, or to establish virtual...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Web Server Optimization: A DNS Based Approach

    A group of web-server system can be deployed to support high request rate. The Domain Name System (DNS) servers act as a mediator between the client and web-servers. It dispatches the client request among the web-servers through the URL-name to IP-address mapping mechanism. In this paper, the authors propose a...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Wireless Sensor Embedded Steering Wheel for Real Time Monitoring of Driver Fatigue Detection

    Accidents due to drowsy driving have shown a steep increase in the past decade. An efficient safety measure is required to mitigate the impact of accidents. This paper details the system architecture for real-time, non-obstructive, automatic detection and alarming for driver drowsiness. Data/sensor fusion technology incorporated with the system monitors...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    A Security Mechanism for Remote Monitoring System Security Using Smartphone

    This paper proposes a security mechanism for remote monitoring system through a combination between user's password and random number by using SMS service over 3G networks. By using random number and phone number, this mechanism is not only able to provide robust security from replay attack and dictionary attack but...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Reliable Protection Scheme Against Cooperative Black Hole Attack in MANET

    Mobile Ad-hoc networks are a collection of mobile hosts that communicate with each other without any infrastructure. Due to security vulnerabilities of the routing protocols, wireless ad hoc networks may be unprotected against attacks by the malicious nodes. One of these attacks is the Black Hole Attack against network integrity...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Improvement Authentication of Routing Protocols for Mobile Ad Hoc Networks

    Ad Hoc network Consist of mobile hosts (or nodes) which communicate with other nodes through wireless medium without any fixed infrastructure. Dynamic network topology: the mobile nodes are free to move randomly and organize themselves arbitrarily the wireless links in this network are highly error prone and can do down...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    A Scheme of Detection and Prevention Rogue AP Using Comparison Security Condition of AP

    Rogue Access Points (RAPs) cause serious security threats to wireless networks. To detect RAPs, the authors propose a novel user-oriented framework based on security condition. AP's security condition which includes cipher and authentication type has been specified by the vendors. So, it is difficult to be faked when authentication type...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Implementation Issues and What to Compute on Cloud

    The development of worldwide networks, open systems and new technology trends a new type of computing where computational power is provided similar to utilities like water, gas or electricity. Cloud computing refers to the concept of grid computing, utility computing and virtualization. It elevates knowledge management to newer heights by...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Effect of CWND and RTO in the Performance of Wireless Networks

    In this paper, the authors describe a ns based simulation analysis of TCP performance over a hybrid network with first link as a wireless link. The latter choice is for understanding performance issues with better clarity. The effect of wireless errors on different TCP parameters resulted into end to end...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Survey on Trusted Agent-Based On-Demand Routing Protocol in MANET

    Ad-hoc wireless networks are self-organising, infrastructure less networks characterized by dynamic topology, limited channel bandwidth and limited battery power at the nodes. The nodes communicate with each other through radio links in multihop specified routing protocols. The concept of agent is introduced in MANET to reduce the load on node...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    The Economic Perspective of Cloud Computing

    Cloud computing is an innovative, emerging and a novel phenomenon that paves the way for provisioning of infinitely scalable, re-usable, multipurpose, flexible, cost-saving, efficient and customizable on-demand information technology services and products. The promise of cloud computing is to deliver all the functionality of existing information technology services (and in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementing Video Data Compression Along With Network Coding in Video Multicast

    This paper presents a technical review to real time Video Multicast. In this paper Video Multicast technique is being described and to improve the quality and efficiency using network coding and video data compression. Video data compression is concerned with reducing the amount of data required to reproduce a digital...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Priority Based Energy-Efficient Data Forwarding Algorithm in Wireless Sensor Networks

    A Wireless Sensor Network (WSN) can be described as a collection of untethered sensor nodes. An important application of WSN is in the field of real-time communication. Real-time communication is a critical service which requires a qualitative routing protocol for energy-efficient network communication. The judicious use of energy of the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Creation and Prevention of Persistent XSS Attack

    Web applications are often vulnerable to attacks. Research data shows that over 80% of the applications are vulnerable to CROSS Site Scripting (XSS) attacks. It commonly targets scripts embedded in a page which are executed on client side (on the user's web browser) rather than on server side. It involves...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Review of Routing and Switching

    The computer network are playing an important role in providing services to large organization as well as to individual person. A network is a group of interconnected computers that allows to share information and resources (such as printers) from one computer to another. A network with the right software helps...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Services for Converged IP Networks

    Rapid growth of computer network leading to converging necessitates management of servers by a server. Simple Network Management Protocol (SNMP) based management cannot be used for the converged network management due to its limitations and relatively simple monitoring. Therefore, alternative technologies are required to meet various goals such as scalability,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2011

    Communication in Parallel and Distributed Systems

    Communication is an essential part of distributed computing and parallel computing. There exist many topologies, network architectures and routing schemas for such type of communication. In this paper, the authors will review a few selected network architectures and routing schemes, which are continually going through evolution process. Parallel and distributed...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    DDOS Mitigation Techniques-A Survey

    Distributed Denial of Service (DDOS) attacks are one of the most widely spread problems faced by most of the Internet Service Providers (ISP's) today. Mitigation of these attacks has gained utmost importance in the present scenario. A number of mitigation techniques have been proposed by various researchers. The authors enable...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Digital Watermarking: Current Status and Key Issues

    Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different from the encryption in the sense that it allows the user to access, view and interpret the...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Clustering Protocol Based on Tree Routing Algorithm in Wireless Sensor Networks (WSNs)

    In today's world Wireless Sensor Networks (WSNs) are an emerging technology for monitoring physical environment. WSNs consist of small nodes with sensing, computation and wireless communications capabilities. These sensor nodes are constrained in energy supply, processing and storage. Such constraints combined with a typical deployment of large number of sensor...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Analysis of Enhanced AODV and AODV for Mobile Ad-Hoc Network

    A Mobile Ad hoc NETwork (MANET) is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Secure Communication of Wireless Sensor Network (WSN) Using Coding Theory

    Several schemes to establish secret key between sensor nodes in wireless sensor network for secure communication has been proposed. But due to lack of priori deployment knowledge and limited resources of sensor nodes and security threats, it is always challenging to propose a better scheme apart from existing. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Security Is the Primary Goal for Designing a WSN

    The authors are aware that the power limitation is a critical issue for the sensor nodes, so different scheme or algorithm was proposed to implement the routing protocols to expand the minimum power utilize the maximum work. But it is unfortunate that most of them are not security concerned. As...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Machine Learning Based Anomaly Detection Techniques for Network Intrusion Detection Systems

    Intrusion Detection Systems (IDSs) are an important component of defensive measures protecting computer systems and networks from abuse. Due to the rising complexity and volume of the attacks in the network, Network Intrusion detection systems are preferred over Host based Intrusion detection systems. NIDS are categorized as misuse network intrusion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Application of LZW Technique for ECG Data Compression

    The ECG is an electronic method of recording the heart beat of the patient. The characteristic of heart beat is determined by PQRST curve. By attaching additional leads while recording ECG signals they require higher sampling rates and finer amplitude resolution, for non-cardiac signals such as blood pressure and respiration...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Securing e-Commerce Application Against Various Vulnerability

    The use of internet is increasing rapidly and as the role of e-commerce application is also increases some of these application are quite secure and some of them are unsecure many vulnerability can easily exploit them .Security measure are not effective. And in order to protect these e-commerce application many...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Optimal Implementation of Digital Steganography in an Image for the Secret Communication

    A real-life requirement motivated this case study of secure covert communication. Steganography is a technique used to transfer hidden information in an imperceptible manner. The authors proposed a novel approach of substitution technique of image steganography. The proposed method is completely flexible on size of secret message bits and allows...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Block Truncation Coding With EBTC

    This comparison paper scrutinizes image compression using Block Truncation Coding. Many algorithms were selected likely the original Block Truncation coding, Absolute Moment Block Truncation Coding, a comparison survey was executed. These above techniques are divided image into non overlapping blocks. The authors distinguish in the direction of choosing the quantization...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Tracking and Controlling Object Oriented Software Progress

    There are many ways to look at a problem to be solved using a software-based solution. One widely used approach to problem solving takes an object-oriented viewpoint. The definition of objects encompasses a description of attributes, behaviors, operations, and messages. An object encapsulates both data and the processing that is...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    IP Camera and Mobile Based Remote Login Intrusion Detection

    Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. When a user of an information system takes an action...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Ethnography a Research Method in Software Process Improvements

    Software process improvements are required to increase the productivity of software companies. Generally, it is the aim to increase the quality of the produced software and to keep budget and time. Quality models for software process improvements were developed in context of large organisations and multi-national companies. In this paper,...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Performance Analysis of FIR Filter in Frequency Domain and Time Domain for Wireless Communication System

    This Paper gives design the methodology for implementation of FIR filter in the frequency domain and time domain. The filter coefficients for these two implementation are taken by sampling the time representation and frequency representation of RRC filter. The RRC filter transfer function is used to obtain Raised Cosine filter...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    A Case for Raid

    Mathematicians agree that omniscient communication is an interesting new topic in the field of theory, and steganographers concur. The authors' aim here is to set the record straight. Given the current status of decentralized technology, biologists particularly desire the evaluation of context-free grammar. In this paper, they use empathic symmetries...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // Apr 2012

    Performance Comparision of LEACH, SEP and DEEC Protocol in Wireless Sensor Network

    Wireless Sensor Network is the network of power-limited sensing devices called sensors. Wireless sensor network is differ from other networks in terms of optimization of amount of energy because when these sensors sense and transmit data to other sensors present in the network, considerable amount of energy is dissipated. Various...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Topology Comparision in Wireless Sensor Network MAC Protocol

    A Wireless Sensor Network comprises of number of nodes distributed over an area to collect information. The sensor nodes communicate among themselves through the wireless channel and forward the collected data to its one-hop distant neighboring node. These nodes are normally battery operated. But as these nodes are placed in...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Web Log Mining: An Enhancement to Server Performance and Sight Navigation

    The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. Web Server register a log entry for every single access they get. A huge number of accesses are registered and collected in an ever growing web log. In this...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cryptography and Network Security

    Network security deals with the problems of legitimate messages being captured and replayed. Network security is the effort to create a secure computing platform. The action in question can be reduced to operations of access, modification and Deletion. Many people pay great amounts of lip service to security but do...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Routing and Data Compression in SONET

    With the increasing growth and demand for capacity in national, regional, and even metropolitan optical networks, the authors are increasing the bandwidth of the channel so that more data can be sent in appropriate time duration. So, transmission delay is the main problem to send a large amount of data....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Measuring Parameters for Speech Quality in Cellular Networks

    The rapid growth of cellular networks in recent years results into the need of optimization of networks, so that the people provide a better service to customer without any interruption. The needs of a Cellular operator include proper delivery of data and voice to the Mobile Stations or user equipments....

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Simulation Based Analysis of Position Based Routing Protocols in Vehicular Ad Hoc Networks

    The Vehicular Ad Hoc NETwork (VANET) is a promising new paradigm in the domain of wireless communication employed specially for providing road safety, comfort and convenience to the driver as well as passengers while on the way by the integration of various wireless network technologies, cellular technologies like 2G and...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Multiple Channel Implementations in Wireless Mesh Networks

    The much research progress has been made in network capacity analysis of ad-hoc networks, WMNs have not been fully explored due to the difference between WMNs and ad-hoc networks. The result about network capacity and optimum node density of ad-hoc networks may not directly be applied to the WMNs because...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Design of Stepped-Impedance Microstrip Line Low Pass Filter for Wireless Communication

    Filters play an important role in microwave applications. Microwave systems have an enormous impact on modern society. Applications are diverse, from entertainment via satellite television, to civil and military radar system. In particular, the recent trend of multi-frequency bands and multifunction operations in wireless communication systems along with the explosion...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Comparative Study of Various Key Exchanging Algorithms

    The concept of public key Cryptosystem evolved from an attempt to attack two of the most difficult problems associative with symmetric encryption. The initial problem is that of key distribution. As the authors have seen, key distribution under symmetric encryption requires either that two communication already share a key, which...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Cloud Security Threats

    Cloud is a fundamental shift in the IT architecture, which is why there's a lot fear amongst enterprise to move towards it. Knowing the types of security risks involved can help reduce that fear and increase its adoption. Cloud computing is a model for enabling convenient, on-demand network access to...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Energy Efficient Routing Protocol Using Clustering Technique

    The past few years have witnessed increased interest in the potential use of Wireless Sensor Networks (WSNs) in applications such as disaster management, combat field reconnaissance, border protection and security surveillance. Sensors in these applications are expected to be remotely deployed in large numbers and to operate autonomously in unattended...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Network Security Evaluation Based on Information Security

    The Network security Evaluation is a development of computer and network hot issue in present research of Network technology brings them convenience together security. After acquiring each host's web-based threat exists everywhere, and to attack. Therefore, study and evaluation of the network security will be important practical significance: finding out...

    Provided By Universal Association of Computer and Electronics Engineers

  • White Papers // May 2012

    Implementation of Framing Sequence Algorithms in Netsim

    NetSim is a network simulation tool used by the academic community for teaching. The Data Link Layer deals with the algorithms for achieving reliable, efficient communication between two adjacent machines above the physical layer. Framing is a Protocol Data Unit (PDU) for data link layer is often called a frame...

    Provided By Universal Association of Computer and Electronics Engineers