VIT UNIVERSITY

Displaying 1-40 of 41 results

  • White Papers // Dec 2012

    Response Time Analysis of Messages in Controller Area Network - A Review

    This paper reviews the research work done on the response time analysis of messages in Controller Area Network (CAN) from the time CAN specification was submitted for standardization (1990) and became a standard (1993) up to the present (2012). Such research includes worst case response time analysis which is deterministic...

    Provided By VIT UNIVERSITY

  • White Papers // Jun 2012

    A Study on Internet of Things Based Applications

    This paper gives a detail analysis of various applications based on Internet of Thing (IoT) s. This explains about how internet of things evolved from mobile computing and ubiquitous computing. It emphasises the fact that objects are connected over the internet rather than people. The properties of Internet Of Things...

    Provided By VIT UNIVERSITY

  • White Papers // May 2012

    VCZRP: Enhancing Performance of Mobile Ad Hoc Networks Using Virtual Coordinates

    Ad hoc networks are wireless networks where mobile nodes relay on each other to keep network connected without help of pre-existing infrastructure or centralized control. These are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and limited bandwidth, and potentially large scale makes routing as challenging problem...

    Provided By VIT UNIVERSITY

  • White Papers // May 2012

    Quasi-Orthogonal Space-Time-Frequency Trellis Codes for MIMO-OFDM Systems

    This paper is to design the full-rate Space-Time-Frequency Trellis Code (STFTC), which is based on Quasi-Orthogonal designs for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The proposed Quasi-Orthogonal Space-Time-Frequency Trellis code combines set partitioning and the structure of quasi-orthogonal space-frequency designs in a systematic way. In addition to...

    Provided By VIT UNIVERSITY

  • White Papers // May 2012

    Performance Improvement of Heterogeneous Wireless Networks Using Modified Newton Method

    The heterogeneous wireless networks where coexistence of different Radio Access Technology (RAT) are widely deployed for various services and support various traffic demand, channel allocation. Under heterogeneous wireless networks, a user can send data through a single or multi RATs simultaneous. The objective of this paper is to choose the...

    Provided By VIT UNIVERSITY

  • White Papers // Apr 2012

    Bluetooth Navigation System Using Wi-Fi Access Points

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2011

    ETX Metric for Extremely Opportunistic Routing to Improve the Performance of Hybrid Wireless Networks

    Mobility in wireless networks has paved way for a new paradigm of communication in this era. Exploiting the optimal routing technique for hybrid wireless networks which brings in a balance of the overheads in infrastructure based and infrastructure less network is essential. Routing protocol design for hybrid wireless network is...

    Provided By VIT UNIVERSITY

  • White Papers // Aug 2011

    Performance Analysis of MANET (WLAN) Using Different Routing Protocols in Multi Service Environments-An Quantitative Study

    A Mobile Ad-hoc NETwork is a network (MANET) of wireless Mobile Nodes (MNs) that communicate with each other without centralized control or established infrastructure. Routing protocols are divided into Proactive and Reactive. Proactive is a table - driven protocols. The proactive routing protocols use link-state routing algorithm which frequently flood...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2011

    An Efficient Routing Scheme for Wireless Sensor Networks

    WSN acquires the data of surrounding environments with sensors attached to each node. It is important to design sensor networks that can communicate energy efficiently as well as to derive sensor readings with high accuracy. The proposed routing scheme that assures high accuracy and significantly reduces data transmission costs in...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2011

    Analysis of Performance in the Virtual Machines Environment

    In this paper, the authors propose a scheme that manages the Performance and resource of virtual machines that are used to host computing applications. As the size and complexity of modern computing systems keep increasing to meet the demanding requirements of Performance applications, manageability is becoming an important concern to...

    Provided By VIT UNIVERSITY

  • White Papers // Jun 2011

    Architecture for the Detection of Phishing in Mobile Internet

    Now a day's many phishy websites are created by the attackers to extract all the personal information from the users. Many people use mobile internet through mobile phones. The proposed anti phishing tool to detect the phishing websites is very helpful to save the users from many fraud websites. The...

    Provided By VIT UNIVERSITY

  • White Papers // Jun 2011

    Analyzing an Integrated Technique for the Software Requirements of a Safety Critical System Based on Software Inspection, Requirements Traceability and Fault Tolerance

    Requirement analysis is important for developing and implementing safety critical systems. The system identified is intended to reduce the risks and fulfils earlier discovered safety requirements. A single error during requirements gathering can generate serious software faults. Software inspection is done for the verification and validation process. Traceability of requirements...

    Provided By VIT UNIVERSITY

  • White Papers // May 2011

    Analyzing XML Parsers Performance for Android Platform

    As Internet communication technologies are growing up. XML are rising up as a popular way for data transfer and for exchange of data across the Internet. Now a day's choosing the right parser for a task is crucial and critical since improper parser will lead to degradation and effect in...

    Provided By VIT UNIVERSITY

  • White Papers // Apr 2011

    Characterization and Validation of Requirements Management Measures Using Correlation and Regression Model

    Requirements engineering is one of the challenging and crucial phase in the development of software products. One of the key reasons found in literature survey the failure of software projects due to poor project management and requirement management activity. This paper mainly addresses - Formulate a mixed organization structure of...

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2011

    Enhanced Security for Information Flow in VANET Using Signcryption and Trust Level

    Security in vehicular ad hoc network has always been a major research area. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge over VANET. Two levels of security have been proposed based on signcryption and node trust. Using signcryption the computation...

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2011

    A Study on Cross Layer MAC Design for Performance Optimization of Routing Protocols in MANETs

    One of the most visible trends in today's commercial communication market is the adoption of wireless technology. Wireless networks are expected to carry traffic that will be a mix of real time traffic such as voice, multimedia conferences, games and data traffic such as web browsing, messaging and file transfer....

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2011

    Optimism Analysis of Parallel Queries in Databases Through Multicores

    Apart from data management techniques such as datawarehousing and mining this paper focus mainly on parallelism optimization for peculiar queries for particular applications. Queries involved in day to day database application may of different types such as queries with multiple relations, queries with single relations and multiple operations, multiple queries...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2011

    A Review on Analyzing the Effects of Combining Diverse Fault Detection Techniques for a Reliable Software

    Software reliability is also (qualitatively) demonstrated by the process followed to develop the software. The best dimension of a good development process is to implement a fault tolerance design, to ensure mistake proof loading and operation. The reliability assurance techniques are extended to ensure safe or secure critical requirements. The...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2011

    Network Management by Using Global Positioning System (GPS)

    The Organization Network is the place where large number of attacks is happening. The attackers are using different methodologies to capture the information from the end user without the knowledge of the end user. This paper introduces the concepts of Network Management and Emergency log by using Global Positioning System...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2010

    A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment

    Cloud computing is an Internet based development, in concept, it is a paradigm shift whereby details are abstracted from the users who no longer need knowledge of, expertise in, or control over the technology infrastructure that supports them. According to a 2008 IEEE paper, "Cloud Computing is a paradigm in...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2010

    Call Dropping Analysis in a UMTS/WLAN Integrated Cell

    Dropping probability of the call requests in the UMTS with integrated WLAN reduces drastically if some portion of the WLAN bandwidth is kept reserved for the UMTS traffic. But the Call Admission Control (CAC) requires a new air interface on the reserved WLAN spectrum to handle the denied requests of...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2010

    Survey and Analysis of Various Routing Techniques and Metrics in Wireless Networks

    The focus of this paper is to survey the use of EXOR routing scheme and routing metrics to be applied in hybrid wireless networks over the traditional unicast routing protocols used for mobile ad hoc networks. On performing a thorough analysis of various literatures, it is proposed that use of...

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2010

    An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks

    Wireless Sensor Networks (WSN) represent a new paradigm shift in Adhoc networks. Wireless Sensor Networks consists of small nodes with sensing, computation and communication capabilities. The sensor networks task is to sense the environment, and relay the information back to a remote base station, where the user can access it....

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2010

    Key-Management Systems in Vehicular Ad-Hoc Networks

    Networking in vehicles is a promising approach to facilitate road safety, traffic management, and infotainment dissemination for drivers and travelers. Hence it becomes essential to provide security services such as authentication, non-repudiation, confidentiality, access control, integrity, and availability. The possible types of attacks include eavesdropping, denial of service and replay...

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2010

    Forwarding of Multiple Messages to Multiple Destinations by Using Mobile Agents

    Today in this competitive world where everybody depends on the mobile technology run with the need of possessing mobiles and enjoying the facilities of ease to send messages to their near and dear ones. People need to perform their tasks for informing, contacting and keeping an up to date of...

    Provided By VIT UNIVERSITY

  • White Papers // Oct 2010

    Heuristic Approaches With Energy Management for Node Placement in Wireless Sensor Networks

    In wireless sensor network, Device placement is a key factor for determining the coverage, connectivity, and cost along with lifetime. Managing the sensor nodes is not much easier while comparing mobile ad-hoc networks. But the same approach can be implemented to manage the WSN. Addressing the management of the whole...

    Provided By VIT UNIVERSITY

  • White Papers // Aug 2010

    Investigation on Efficient Management of Workflows in Cloud Computing Environment

    Cloud computing is an on-demand service model often based on virtualization technique and this paper explores the use of cloud computing for scientific workflows, focusing on a widely used application. The approach is to evaluate from the point of view of a scientific workflow the tradeoffs between running in a...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2010

    Network Security

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "Wired", an increasing number of people need to understand the basics of security in a networked world. This paper was written with the basic computer user and information systems...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2010

    An Intelligent Driver Assistance System (I-DAS) for Vehicle Safety Modelling Using Ontology Approach

    This paper proposes an ontology modeling approach for assisting vehicle drivers through safety warning messages during time critical situation. Intelligent Driver Assistance System (I-DAS) is a major component of In VANET, which focuses on generating the alert messages based on the context aware parameters such as driving situations, vehicle dynamics,...

    Provided By VIT UNIVERSITY

  • White Papers // Apr 2010

    Offline Navigation System for Mobile Devices

    The theme of the software that the authors have been developing is a combination of Mobile Solutions and Leveraging Geo data and Maps to organize the world's information and to make it universally accessible and useful to a wider and better extent. The project is a mobile application that allows...

    Provided By VIT UNIVERSITY

  • White Papers // Mar 2010

    Securing Internet Protocol (IP) Storage

    Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others....

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2010

    Solovay-Strassen Test in a RSA Pubic Key Cryptosystem

    In this paper, RSA type of Public key cryptosystem is designed based on Solovay-Stressen test known as S-RSA Cryptosystem. The efficiency of the S-RSA cryptosystem is nearly twice of the efficiency of basic RSA cryptosystem which is proved mathematically and is shown graphically with an illustration. Also, the Performance of...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2010

    A Frame Work for Ontological Privacy Preserved Mining

    Data Mining analyses the stocked data and helps in foretelling the future trends. There are different techniques by which data can be mined. These different techniques reveal different types of hidden knowledge. Using the right procedure of technique result specific patterns emerge. Ontology is a specification of conceptualization. It is...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2009

    A Reliable Replication Strategy for VoD System Using Markov Chain

    In this paper the authors have investigated on the reliability of streams for a VoD system. The objective of the paper is to maximize the availability of streams for the peers in the VoD system. They have achieved this by using data replication technique in the peers. Hence, they proposed...

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2009

    Flare: Architecture for Rapid and Easy Development of Internet-Based Applications

    The authors propose an architecture, Flare, that is a structured and easy way to develop applications rapidly, in a multitude of languages, which make use of online storage of data and management of users. The architecture eliminates the need for server-side programming in most cases, creation and management of online...

    Provided By VIT UNIVERSITY

  • White Papers // Oct 2009

    Agent Based Trust Management Model Based on Weight Value Model for Online Auctions

    An online auction is simply defined as a virtual marketplace hosted on the Internet to match buyers and sellers of goods around the globe regardless of the physical limitations of traditional auctions such as geography, presence, time, and space. Online auctions operate different protocols including English, Dutch, First-Price Sealed Bid...

    Provided By VIT UNIVERSITY

  • White Papers // Oct 2009

    Data Security in Mobile Devices by Geo Locking

    In this paper the authors present a way of hiding the data in mobile devices from being compromised. They use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2009

    Intelligent Intrusion Detection System Framework Using Mobile Agents

    An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown...

    Provided By VIT UNIVERSITY

  • White Papers // Mar 2009

    A Study of Technological Trends in Wireless Telecommunications

    The success of wireless communications for voice applications is evidenced by the sale of 400 billion GSM cell-phones every year worldwide. Wireless telephony has changed the way one lives, work, and play. The emergence of the Internet in the last decade changed the way one shares information with each other,...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2009

    A Hash Based Mining Algorithm for Maximal Frequent Item Sets Using Linear Probing

    Data mining is having a vital role in many of the applications like market-basket analysis, in biotechnology field etc. In data mining, frequent item-sets plays an important role which is used to identify the correlations among the fields of database. In this paper, the authors propose an algorithm, HBMFI-LP which...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2012

    Response Time Analysis of Messages in Controller Area Network - A Review

    This paper reviews the research work done on the response time analysis of messages in Controller Area Network (CAN) from the time CAN specification was submitted for standardization (1990) and became a standard (1993) up to the present (2012). Such research includes worst case response time analysis which is deterministic...

    Provided By VIT UNIVERSITY

  • White Papers // Mar 2009

    A Study of Technological Trends in Wireless Telecommunications

    The success of wireless communications for voice applications is evidenced by the sale of 400 billion GSM cell-phones every year worldwide. Wireless telephony has changed the way one lives, work, and play. The emergence of the Internet in the last decade changed the way one shares information with each other,...

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2010

    An Efficient Routing Protocol Design for Distributed Wireless Sensor Networks

    Wireless Sensor Networks (WSN) represent a new paradigm shift in Adhoc networks. Wireless Sensor Networks consists of small nodes with sensing, computation and communication capabilities. The sensor networks task is to sense the environment, and relay the information back to a remote base station, where the user can access it....

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2010

    Key-Management Systems in Vehicular Ad-Hoc Networks

    Networking in vehicles is a promising approach to facilitate road safety, traffic management, and infotainment dissemination for drivers and travelers. Hence it becomes essential to provide security services such as authentication, non-repudiation, confidentiality, access control, integrity, and availability. The possible types of attacks include eavesdropping, denial of service and replay...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2010

    Network Security

    Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become "Wired", an increasing number of people need to understand the basics of security in a networked world. This paper was written with the basic computer user and information systems...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2011

    Network Management by Using Global Positioning System (GPS)

    The Organization Network is the place where large number of attacks is happening. The attackers are using different methodologies to capture the information from the end user without the knowledge of the end user. This paper introduces the concepts of Network Management and Emergency log by using Global Positioning System...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2011

    A Review on Analyzing the Effects of Combining Diverse Fault Detection Techniques for a Reliable Software

    Software reliability is also (qualitatively) demonstrated by the process followed to develop the software. The best dimension of a good development process is to implement a fault tolerance design, to ensure mistake proof loading and operation. The reliability assurance techniques are extended to ensure safe or secure critical requirements. The...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2010

    An Intelligent Driver Assistance System (I-DAS) for Vehicle Safety Modelling Using Ontology Approach

    This paper proposes an ontology modeling approach for assisting vehicle drivers through safety warning messages during time critical situation. Intelligent Driver Assistance System (I-DAS) is a major component of In VANET, which focuses on generating the alert messages based on the context aware parameters such as driving situations, vehicle dynamics,...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2009

    A Hash Based Mining Algorithm for Maximal Frequent Item Sets Using Linear Probing

    Data mining is having a vital role in many of the applications like market-basket analysis, in biotechnology field etc. In data mining, frequent item-sets plays an important role which is used to identify the correlations among the fields of database. In this paper, the authors propose an algorithm, HBMFI-LP which...

    Provided By VIT UNIVERSITY

  • White Papers // Apr 2012

    Bluetooth Navigation System Using Wi-Fi Access Points

    There have been various navigation and tracking systems being developed with the help of technologies like GPS, GSM, Bluetooth, IR, Wi-Fi and Radar. Outdoor positioning systems have been deployed quite successfully using GPS but positioning systems for indoor environments still do not have widespread deployment due to various reasons. Most...

    Provided By VIT UNIVERSITY

  • White Papers // Jun 2012

    A Study on Internet of Things Based Applications

    This paper gives a detail analysis of various applications based on Internet of Thing (IoT) s. This explains about how internet of things evolved from mobile computing and ubiquitous computing. It emphasises the fact that objects are connected over the internet rather than people. The properties of Internet Of Things...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2009

    A Reliable Replication Strategy for VoD System Using Markov Chain

    In this paper the authors have investigated on the reliability of streams for a VoD system. The objective of the paper is to maximize the availability of streams for the peers in the VoD system. They have achieved this by using data replication technique in the peers. Hence, they proposed...

    Provided By VIT UNIVERSITY

  • White Papers // May 2008

    Improving Performance and Fault Tolerance on Dependable Computing Architectures

    Dependability and fault tolerance are the primary factors deciding the performance of computer architectures. Use of self checking instructions is a technique towards fault coverage. Careful evaluation of instruction sequencing in processor design, choice of cache capacity and RISC orientation can lead to I/O improvement in application architectures. The error...

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2010

    Solovay-Strassen Test in a RSA Pubic Key Cryptosystem

    In this paper, RSA type of Public key cryptosystem is designed based on Solovay-Stressen test known as S-RSA Cryptosystem. The efficiency of the S-RSA cryptosystem is nearly twice of the efficiency of basic RSA cryptosystem which is proved mathematically and is shown graphically with an illustration. Also, the Performance of...

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2011

    Enhanced Security for Information Flow in VANET Using Signcryption and Trust Level

    Security in vehicular ad hoc network has always been a major research area. Reducing cost of computation, effective consumption of limited resources and providing uncompromised security has always been a challenge over VANET. Two levels of security have been proposed based on signcryption and node trust. Using signcryption the computation...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2011

    An Efficient Routing Scheme for Wireless Sensor Networks

    WSN acquires the data of surrounding environments with sensors attached to each node. It is important to design sensor networks that can communicate energy efficiently as well as to derive sensor readings with high accuracy. The proposed routing scheme that assures high accuracy and significantly reduces data transmission costs in...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2010

    A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment

    Cloud computing is an Internet based development, in concept, it is a paradigm shift whereby details are abstracted from the users who no longer need knowledge of, expertise in, or control over the technology infrastructure that supports them. According to a 2008 IEEE paper, "Cloud Computing is a paradigm in...

    Provided By VIT UNIVERSITY

  • White Papers // Oct 2010

    Heuristic Approaches With Energy Management for Node Placement in Wireless Sensor Networks

    In wireless sensor network, Device placement is a key factor for determining the coverage, connectivity, and cost along with lifetime. Managing the sensor nodes is not much easier while comparing mobile ad-hoc networks. But the same approach can be implemented to manage the WSN. Addressing the management of the whole...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2010

    Call Dropping Analysis in a UMTS/WLAN Integrated Cell

    Dropping probability of the call requests in the UMTS with integrated WLAN reduces drastically if some portion of the WLAN bandwidth is kept reserved for the UMTS traffic. But the Call Admission Control (CAC) requires a new air interface on the reserved WLAN spectrum to handle the denied requests of...

    Provided By VIT UNIVERSITY

  • White Papers // Aug 2010

    Investigation on Efficient Management of Workflows in Cloud Computing Environment

    Cloud computing is an on-demand service model often based on virtualization technique and this paper explores the use of cloud computing for scientific workflows, focusing on a widely used application. The approach is to evaluate from the point of view of a scientific workflow the tradeoffs between running in a...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2011

    Analysis of Performance in the Virtual Machines Environment

    In this paper, the authors propose a scheme that manages the Performance and resource of virtual machines that are used to host computing applications. As the size and complexity of modern computing systems keep increasing to meet the demanding requirements of Performance applications, manageability is becoming an important concern to...

    Provided By VIT UNIVERSITY

  • White Papers // Aug 2011

    Performance Analysis of MANET (WLAN) Using Different Routing Protocols in Multi Service Environments-An Quantitative Study

    A Mobile Ad-hoc NETwork is a network (MANET) of wireless Mobile Nodes (MNs) that communicate with each other without centralized control or established infrastructure. Routing protocols are divided into Proactive and Reactive. Proactive is a table - driven protocols. The proactive routing protocols use link-state routing algorithm which frequently flood...

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2011

    A Study on Cross Layer MAC Design for Performance Optimization of Routing Protocols in MANETs

    One of the most visible trends in today's commercial communication market is the adoption of wireless technology. Wireless networks are expected to carry traffic that will be a mix of real time traffic such as voice, multimedia conferences, games and data traffic such as web browsing, messaging and file transfer....

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2010

    Survey and Analysis of Various Routing Techniques and Metrics in Wireless Networks

    The focus of this paper is to survey the use of EXOR routing scheme and routing metrics to be applied in hybrid wireless networks over the traditional unicast routing protocols used for mobile ad hoc networks. On performing a thorough analysis of various literatures, it is proposed that use of...

    Provided By VIT UNIVERSITY

  • White Papers // May 2011

    Analyzing XML Parsers Performance for Android Platform

    As Internet communication technologies are growing up. XML are rising up as a popular way for data transfer and for exchange of data across the Internet. Now a day's choosing the right parser for a task is crucial and critical since improper parser will lead to degradation and effect in...

    Provided By VIT UNIVERSITY

  • White Papers // Jun 2011

    Architecture for the Detection of Phishing in Mobile Internet

    Now a day's many phishy websites are created by the attackers to extract all the personal information from the users. Many people use mobile internet through mobile phones. The proposed anti phishing tool to detect the phishing websites is very helpful to save the users from many fraud websites. The...

    Provided By VIT UNIVERSITY

  • White Papers // Dec 2011

    ETX Metric for Extremely Opportunistic Routing to Improve the Performance of Hybrid Wireless Networks

    Mobility in wireless networks has paved way for a new paradigm of communication in this era. Exploiting the optimal routing technique for hybrid wireless networks which brings in a balance of the overheads in infrastructure based and infrastructure less network is essential. Routing protocol design for hybrid wireless network is...

    Provided By VIT UNIVERSITY

  • White Papers // Jun 2011

    Analyzing an Integrated Technique for the Software Requirements of a Safety Critical System Based on Software Inspection, Requirements Traceability and Fault Tolerance

    Requirement analysis is important for developing and implementing safety critical systems. The system identified is intended to reduce the risks and fulfils earlier discovered safety requirements. A single error during requirements gathering can generate serious software faults. Software inspection is done for the verification and validation process. Traceability of requirements...

    Provided By VIT UNIVERSITY

  • White Papers // Jul 2009

    Intelligent Intrusion Detection System Framework Using Mobile Agents

    An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown...

    Provided By VIT UNIVERSITY

  • White Papers // Oct 2009

    Agent Based Trust Management Model Based on Weight Value Model for Online Auctions

    An online auction is simply defined as a virtual marketplace hosted on the Internet to match buyers and sellers of goods around the globe regardless of the physical limitations of traditional auctions such as geography, presence, time, and space. Online auctions operate different protocols including English, Dutch, First-Price Sealed Bid...

    Provided By VIT UNIVERSITY

  • White Papers // Oct 2009

    Data Security in Mobile Devices by Geo Locking

    In this paper the authors present a way of hiding the data in mobile devices from being compromised. They use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second...

    Provided By VIT UNIVERSITY

  • White Papers // Jan 2010

    A Frame Work for Ontological Privacy Preserved Mining

    Data Mining analyses the stocked data and helps in foretelling the future trends. There are different techniques by which data can be mined. These different techniques reveal different types of hidden knowledge. Using the right procedure of technique result specific patterns emerge. Ontology is a specification of conceptualization. It is...

    Provided By VIT UNIVERSITY

  • White Papers // Feb 2011

    Optimism Analysis of Parallel Queries in Databases Through Multicores

    Apart from data management techniques such as datawarehousing and mining this paper focus mainly on parallelism optimization for peculiar queries for particular applications. Queries involved in day to day database application may of different types such as queries with multiple relations, queries with single relations and multiple operations, multiple queries...

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2010

    Forwarding of Multiple Messages to Multiple Destinations by Using Mobile Agents

    Today in this competitive world where everybody depends on the mobile technology run with the need of possessing mobiles and enjoying the facilities of ease to send messages to their near and dear ones. People need to perform their tasks for informing, contacting and keeping an up to date of...

    Provided By VIT UNIVERSITY

  • White Papers // Mar 2010

    Securing Internet Protocol (IP) Storage

    Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others....

    Provided By VIT UNIVERSITY

  • White Papers // Apr 2010

    Offline Navigation System for Mobile Devices

    The theme of the software that the authors have been developing is a combination of Mobile Solutions and Leveraging Geo data and Maps to organize the world's information and to make it universally accessible and useful to a wider and better extent. The project is a mobile application that allows...

    Provided By VIT UNIVERSITY

  • White Papers // Apr 2011

    Characterization and Validation of Requirements Management Measures Using Correlation and Regression Model

    Requirements engineering is one of the challenging and crucial phase in the development of software products. One of the key reasons found in literature survey the failure of software projects due to poor project management and requirement management activity. This paper mainly addresses - Formulate a mixed organization structure of...

    Provided By VIT UNIVERSITY

  • White Papers // Nov 2009

    Flare: Architecture for Rapid and Easy Development of Internet-Based Applications

    The authors propose an architecture, Flare, that is a structured and easy way to develop applications rapidly, in a multitude of languages, which make use of online storage of data and management of users. The architecture eliminates the need for server-side programming in most cases, creation and management of online...

    Provided By VIT UNIVERSITY

  • White Papers // May 2012

    VCZRP: Enhancing Performance of Mobile Ad Hoc Networks Using Virtual Coordinates

    Ad hoc networks are wireless networks where mobile nodes relay on each other to keep network connected without help of pre-existing infrastructure or centralized control. These are characterized by dynamic topology caused by node mobility, multihop wireless connectivity and limited bandwidth, and potentially large scale makes routing as challenging problem...

    Provided By VIT UNIVERSITY

  • White Papers // May 2012

    Quasi-Orthogonal Space-Time-Frequency Trellis Codes for MIMO-OFDM Systems

    This paper is to design the full-rate Space-Time-Frequency Trellis Code (STFTC), which is based on Quasi-Orthogonal designs for Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) systems. The proposed Quasi-Orthogonal Space-Time-Frequency Trellis code combines set partitioning and the structure of quasi-orthogonal space-frequency designs in a systematic way. In addition to...

    Provided By VIT UNIVERSITY