ENGINEERING RESEARCH PAPERS

computer network research papers 2012




Cyber Crime based Curve Fitting Analysis in Internet Traffic Sharing in Computer Network
free download

ABSTRACT Many well-developed countries are having broadband services for there network connection but under developed countries are still having the dial-up-setup connection network. The cyber crime users are growing fast in the entire world and

Differential epidemic model of virus and worms in computer network
free download

ABSTRACT A differential electronic Susceptible-Infectious-Removed-Susceptible (e-SIRS) epidemic model of virus and worms in a computer network has been formulated. Latent period, immune period and time for self replication have been considered. Stability of the

A Framework for Selecting the Most Reliable Path in a Computer Network using Particle Swarm Optimization (PSO) based on Fuzzy Logic
free download

ABSTRACT Reliability is one of the most important factors for assessing the performance of the network. Packets should pass through the most reliable path. This paper presents a technique for selecting the most reliable path for communication between node pairs of a

Performance evaluation of a Wireless Computer Network
free download

ABSTRACT This paper presents a predicted target architecture of an integrated manufacturing and management system for a manufacturer of household appliances, based on a metropolitantype infranet and an industrial process control and monitoring wireless

SIjRS E-Epidemic Model With Multiple Groups of Infection In Computer Network
free download

ABSTRACT In order to protect cyber world from different kind of malicious objects, we strived to develop SI1I2I3RS (Susceptible, Infectious due to worm, Infectious due to virus, Infectious due to Trojan Horse, Recovered and Susceptible) model for the transmission of malicious

Least Square Curve Fitting Applications under Rest State Environment in Internet Traffic Sharing in Computer Network
free download

ABSTRACT While dealing with internet users in the setup of two operators the relationship between traffic sharing and blocking probability is examined by many authors using Markov chain model. Assuming dial-up-setup of connection network and introduction of rest state

Curve Fitting Analysis of Internet Traffic Sharing Management in Computer Network under Cyber Crime
free download

ABSTRACT Cyber crime is growing fast day-by-day through the spreading of Internet around the world. Many under-developed countries are using dial-up-setup network where a call is connected only after a little extra effort. Some identified cyber crimes are writing abusive

Analysis of ANN-based Echo State Network Intrusion Detection in Computer Networks
free download

critical. A single intrusion of a computer network can result in the loss of unauthorized utilization or modification of large amounts of data and cause users to question the reliability of all of the information on the network. IDSs

Calculus of Computer Network
free download

ABSTRACT The existing dynamic traffic assignment researches mostly based on ideal hypothesis conditions which can analyze the affection of all kinds of traffic parameters on traffic flow and find out characteristics of various types of traffic distribution, but there is

Resilience in computer network management
free download

The protection of network infrastructure and services is one of the main issues network managers face today. This paper investigates this matter through the study of network resilience. A resilience factor (RF) is proposed to take into account topological aspects of

Computer Network Routing with a Fuzzy Neural Network
free download

ABSTRACT The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. As more individuals transmit data through a computer network, the quality of service received

An application of polynomial metric spaces in computer network design
free download

Combinatorial designs have had substantial application in the design of statistical experiments and in the theory of error correcting codes for a long time. Perhaps, because of their very strong symmetrical properties and balance their applications in the computer

Maintenance reliability of a computer network with nodes failure in the cloud computing environment
free download

Abstract. With the development of information technology, the cloud computing service has become a new paradigm for the business and industry. In a cloud computing environment, the computer network (CN) can be constructed as a multistate network with several

Computer Network Security and Software Agents
free download

ABSTRACT Preventing unauthorized access to corporate information systems is essential for many organizations. To address this problem we built a security enhancement software system using software agents, in which a core software agent resides on a server and

Multi-Agent System for Informational Support of Collaborative Researchers Work in aComputer Network
free download

Abstract The article considers the model of researchers interaction when conducting a collaborative project. We also propose a multi-agent system architecture for informational support of the process of collaborative research using Internet technologies.

Computer Network Security
free download

Method-Important new techniques have been developed to overcome some of the security deficiencies (IPSEC, SSL, firewalls, etc.). To address some security issues and the rapid depletion addresses of IPv4 the Network Working Group of the Internet Engineering Task

COMPUTER NETWORK DESIGN BASED ON AHP METHOD
free download

ABSTRACT. The article presents an approach to computer network design based on one of Decision Support Systems. Classic and well known AHP method has been used and implemented. Simulation results for selected sets of criterion/variant values have been

ComputerNetwork Security
free download

When we communicate with each other by using Computers through E Mails, a number of Computers are used for this purpose and the collection of these computers forms a network, which is called a Computer Network.

An Intelligent Fuzzy Neural Routing Scheme for Improving Computer Network
free download

ABSTRACT The growing usage of computer networks is requiring improvements in network technologies and management techniques so users will receive high quality service. Determining the best route through a wide area network (WAN), requires the routing

Computer Network Topology Design in Limelight of
free download

ABSTRACT Constantly growing demands of high productivity and security of computer systems and computer networks call the interest of specialists in the environment of construction of optimum topologies of computer mediums. In earliest phases of design, the study of the

Computer Network ManagementApplying Web Services with Mobile Agent
free download

ABSTRACT In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is-it reduces network traffic load. The Mobile Agent technology invented to

Performance Analysis of Distributed Computer Network over IP Protocol
free download

ABSTRACT Computer Networking is necessary to human beings. Peoples needed to share ideas, research knowledge, and the way of life to their friends. In the modern time, the role of computer networks became dreamy. Analyzing, accessing, sharing and storing of data

Performance Evaluation of QoS Routing in Computer Network
free download

ABSTRACT We discuss and evaluate Optimized Link State Routing Protocol OLSR routing measurement performance analysis based on different simulation parameters. We have used NS-2 simulator tools for the performance of OLSR routing protocol simulation, we