- Filter by:
-
Content Type
-
Topic
-
Cloud computing is an upcoming field having lots of scope and research areas. In this age of technology everything from their home to office is done in the cloud and it is the future of technology. There are so many research has been done in this field to improve the...
Download Now -
Deduplication Techniques in Storage System
Ever increasing volume of back up data in cloud storage may be a vital challenge. There is a need of data management as back up windows are shrinking due to growth of information. So, to make data management scalable deduplication concept is used. It is a technique of keeping only...
Download Now -
Unauthorized Access Point Detection in Wireless LAN
Illegal access point called as Rogue Access Point (RAP) is an access point that has been installed on a secure network without explicit authorization from a system administrator Wireless Networks has big security threat called rogue access points. If care is not taken and if this network threats are not...
Download Now -
Design and Development of a Vehicle Monitoring System Using CAN Protocol
Now-a-days, economical automobiles are developed by more of electro mechanical parts with analog interface for efficient & cost effective operation. Generally a vehicle is built with an analog driver-vehicle interface for indicating various vehicle statuses like speed, fuel level, engine temperature etc. This paper presents a design & development of...
Download Now -
Detection of False Sub Aggregated Data in Wireless Sensor Networks
In wireless sensor networks data aggregation is one of the major issues. To aggregate the data a robust aggregation framework called synopsis diffusion which combines multi path routing algorithm to accurately aggregate the data in case of failures, Nodes are compromising due to the lack of physical protection. Compromised nodes...
Download Now -
Virtual Clustering Based Routing for Power Heterogeneous MANETs
In MANETs (Mobile Ad hoc NETworks), network may consist of devices with multiple characteristics in terms of transmission power, energy, capacity etc. Especially in MANETs, network may consist of devices with multiple; nodes are likely to transmit at different power levels, thereby causing conversation links varying. This causes link asymmetry...
Download Now -
Co and Adjacent Channel Interference Evaluation in GSM and UMTS Cellular Networks
Interference is the major limiting factor when evaluating the performance of cellular radio systems. Sources of interference could be another mobile at the same cell, a call in progress in a neighboring cell or other base stations operating in the same frequency band. Interference on voice channels causes cross talk...
Download Now -
Internet of Things (IOT) Standards, Protocols and Security Issues
The Internet of Things (IoT) is the new revolution of internet after PCs and servers-clients communication now sensors, smart object, wearable devices and Smartphones are able to communicate. Everything surrounding them can talk to each other. Life will be easier and smarter with smart environment, smart homes, smart cities and...
Download Now -
Building a composite web service as per the user's complex need requires using the multiple online web services available. Selecting the best web service for composition will become combinatorial problem leads to be the NP (Nondeterministic Polynomial) complete problem. To solve this problem they are proposing a framework for composite...
Download Now -
Novel Approach for Policy Network Extraction from Web Documents
The increment of information in the web is too large, so search engine come to play an important role to find relation between input keywords. Policy networks are one well defined domain for research. In today's world policy networks are used by economists and political scientists. The analysis of policy...
Download Now