Academic Science

Displaying 1-40 of 185 results

  • White Papers // Jan 2015

    Associative Classifier for Software Fault Tolerance in presence of Class Imbalance

    Software fault prediction is crucial in reducing the overall cost for developing a software product and also to assure the quality of the finished software product. Different software quality models based on data mining techniques are in existence for identifying software-fault prone modules. However, the presence of class imbalance problem...

    Provided By Academic Science

  • White Papers // Jan 2015

    Security Using Cryptographic Techniques for Image Processing

    In this paper, the authors focus mainly on the different kinds of image security techniques. The digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are lots of other techniques which enhance the...

    Provided By Academic Science

  • White Papers // Jan 2015

    Inquiry Dispensation in Wireless Environments Based on Location

    Generally, in real world the answer for a particular realistic problem is based on the query of the inquirer. Similarly, there has been a growing interest in Spatial Queries Based on Location (SQBLs) refer to spatial queries whose answers depend on the location of the inquirer. Efficient processing of SQBLs...

    Provided By Academic Science

  • White Papers // Jan 2015

    Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review

    Today, cloud computing systems are providing a wide variety of services and interfaces to which different service providers are now renting out spaces on their physical machines at an hourly rate. A cloud data center is an infrastructure that supports Internet services with wide coverage. Cloud computing is rapidly changing...

    Provided By Academic Science

  • White Papers // Jan 2015

    New Product Sales Forecasting in the Smart Phone Business: a Comparative Study of Present Methods

    As it is new epoch of technology and every now and then technology is developing very rapidly. With the enlarged development in the technology, global competition in the market is also increasing rapidly. Thus, this development requires the new invention of various products and services in order to survive. One...

    Provided By Academic Science

  • White Papers // Jan 2015

    Big Data Frameworks: At a Glance

    In the modern era of information technology, the usage of IT tools and techniques has increased exponetionally in almost every business organization, enterprises, companies and government organizations. Therefore the rate of generation of data has also increased in exponential order. The huge amount of data which have the various properties...

    Provided By Academic Science

  • White Papers // Jan 2015

    CRYPTOSYSTEM for Text Files Using CFG

    Context free grammars present the desirable cryptographic property that it is easy to generate and validate strings from a given grammar; however it is hard to identify a grammar given only the strings generated by it. Because of this property of CFG the proposed idea is developing a cryptosystem using...

    Provided By Academic Science

  • White Papers // Jan 2015

    Big Data: A Brief Investigation on Different Privacy Issues

    Today, dependency upon the technologies has increased unexpectedly in the digital world. Most of the People are living in the periphery of big data. Increasing popularity and its socio-economic, corporate benefits cannot be ignored. Excessive use of big data has also poses various sociological challenges. Privacy of individual and organization...

    Provided By Academic Science

  • White Papers // Dec 2014

    Third Party Non-Intrusive Multilevel Authentication Framework for Virtual Desktop Infrastructure

    In today's networked world, the need to maintain information security is important and solutions to ensure the security are increasing day-by-day. A robust security is to be provided so as to protect the information. Cloud computing is the pr

    Provided By Academic Science

  • White Papers // Dec 2014

    Mobility Prediction in MANET Routing Using Genetic Algorithm

    Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Because of high mobility of nodes, the network topology of MANETs changes very fast, making it more difficult to find the routes that message packets use. This paper proposes a Genetic Algorithm (GA) based routing with...

    Provided By Academic Science

  • White Papers // Dec 2014

    A Security Mechanism for Cloud Computing Threats

    Cloud computing could be a platform for increasing capabilities and developing potentialities dynamically while not employing new infrastructure, personnel, or software package systems. In Addition, cloud computing originated from an advert enterprise idea, and developed into a flourishing IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to...

    Provided By Academic Science

  • White Papers // Dec 2014

    Voice Translation on Windows & Linux machine

    Voice translation tools provide services to convert words to target language using natural language processing. There are parsing methods which concentrate on capturing keywords & translating them to target language. Current techniques to optimize processing time are template matching, indexing the frequently used words using probability search and session-based cache....

    Provided By Academic Science

  • White Papers // Dec 2014

    Governing of Packet Droppers and Modifiers Attacks in HWSN

    A Wireless Sensor Network (WSN) is a large collection of sensor nodes with limited power Supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks...

    Provided By Academic Science

  • White Papers // Dec 2014

    Fuzzy Neural Network for Clustering and Classification

    Fuzzy Neural Network (FNN) has great advantage in clustering and classification. So in this paper the author introducing a fuzzy neural network for clustering and classification which consist of two training algorithm which combines the advantage of both fuzzy logic and neural network. First algorithm is General Fuzzy Min-Max neural...

    Provided By Academic Science

  • White Papers // Dec 2014

    Designing Metrics to Evaluate the Performance of Agent Oriented Software

    The characteristics of a software agent, such as social ability, pro-activity, reactivity, adaptability, mobility and goal orientation, depend mainly on their execution performance; and it is therefore not easy to measure them by using just static product metrics. The static metric as well as dynamic metrics are to be used...

    Provided By Academic Science

  • White Papers // Nov 2014

    Efficient Routing in Mobile Ad Hoc Networks

    MANET will have dynamic network topology and the nodes move frequently from their positions that lead to cause link failures, packet loss and network congestion, packet transmission rate also becomes low. Existing source routing protocols keep the network congested by flooding the network with route request packets sent for every...

    Provided By Academic Science

  • White Papers // Oct 2014

    DNS Server Cryptography Using Symmetric Key Cryptography

    Before discussing about DNS security extension it is important to know the whole DNS system. The Domain Name System (DNS) is a hierarchical distributed database that facilitates the conversion of human readable host names into IP address and vice versa. The security services are provided in DNS using DNSSEC system...

    Provided By Academic Science

  • White Papers // Sep 2014

    Arduino Based Home Security System

    Security has becoming an important issue everywhere. Home security is becoming necessary now-a-days as the possibilities of intrusion are increasing day-by-day. In this paper, home security system has been designed that has a special feature and which make a dial with the owner of the house to inform that the...

    Provided By Academic Science

  • White Papers // Sep 2014

    Investigation on Oracle Data Miner Purpose - Directed & Undirected

    The majority of businesses have a vast quantity of information, with an immense pact of information extract in it, \"Extracting\" is typically what it is doing: a great deal of information survive that it engulfs a usual way of information scrutiny. Data extracting affords a means to obtain the information...

    Provided By Academic Science

  • White Papers // Aug 2014

    Ability Software Testing Techniques in Cloud Computing

    Cloud computing is the next stage of the internet evolutions. Cloud computing is emerged as new technology in organization and cooperates. To successfully provide cloud services and sharing of resources, the cloud must be tested before came into service. Cloud testing is a form of testing in which web applications...

    Provided By Academic Science

  • White Papers // Aug 2014

    Feature Mining in Customer Reviews using Soft Computing

    Internet is the global system which growing very fast. It is most reliable and efficient one so that the use of internet is increasing in people's day-to-day life. Because of increasing social networking more and more people interact with each other and share their views, emotions, experiences, feedback and opinion...

    Provided By Academic Science

  • White Papers // Aug 2014

    Implementation of Control Transmission Power Features in AODV for Mobile Ad-hoc Network: A Simulation Study

    A mobile ad-hoc network is a wireless local area network which has no any fixed infrastructure. Node can communicate with another node that is immediately within their radio range or one that is outside their radio range not relying on access point. Since node in the mobile ad-hoc network has...

    Provided By Academic Science

  • White Papers // Aug 2014

    Performance Evaluation of WDM-RoF System Based on CO-OFDM using Dispersion Compensation Technique

    In this paper, the authors presented a system design that integrates Coherent-Optical-Orthogonal-Frequency-Division Multiplexing (CO-OFDM) with Wavelength-Division Multiplexing - Radio over Fiber (WDM-RoF) together with dispersion compensation technique to offer a data rate of 48Gbps over more than 80km Single Mode Fiber (SMF) by multiplexing four 12Gbps OFDM channels. In the...

    Provided By Academic Science

  • White Papers // Aug 2014

    Microcontroller Based Wireless Automatic Antenna Positioning System

    The automatic antenna positioning system primarily functions to identify the source of signal. The signal may be of any type and any kind, it automatically identifies the presence of a particular signal and the antenna will remain stationary as long as the signal link is established. Whenever the signal link...

    Provided By Academic Science

  • White Papers // Aug 2014

    With High Level Fragmentation of Dataset, Load Balancing In Cloud Computing

    Cloud computing may be considered as another name for distributed computing by heterogeneous resources over a network, which use all the resources to compute the utility using virtualization technologies and real time communication networks for data transfers (usually over the internet). This gives the ability to run a program over...

    Provided By Academic Science

  • White Papers // Aug 2014

    Effectiveness of Automated Software Testing as a Web Service

    In this paper, the authors make the effectiveness of automated software testing as a web service. They have three types of testing as a web service: very first is programmer's test their code efficiently with less number of resources. A home edition testing service for consumers to test the software...

    Provided By Academic Science

  • White Papers // Aug 2014

    Web Applications Security - A Deep Analysis

    Web applications are one of the most prominent platforms for information and services delivery over Internet now-a-days. As they are increasingly used for critical services, web applications become a popular and valuable target for security attacks. Although a large body of techniques has been developed to attack web applications and...

    Provided By Academic Science

  • White Papers // Jul 2014

    A Study of Various Web Content Mining Techniques and Tools

    With the spectacularly and unpredictable growth of information available over the Internet, WWW has become a powerful platform for storage & retrieval of information. Due to the heterogeneity & unstructured nature of data on WWW, searching of information is becoming cumbersome & time consuming task. Web mining came as solution...

    Provided By Academic Science

  • White Papers // Jul 2014

    Measuring Standard Software Quality Efficiency for Web Applications

    The growth of information on the Web is growing at a speed rate. With this increase in growth rate of information on web, many web based application have combined on Web. Web is a way which provides a same opportunity to all organization's products. The structure of the web contains...

    Provided By Academic Science

  • White Papers // Jul 2014

    Cloud-computing: Challenges, Security and Solutions Using, SaaS

    Cloud-computing, without a doubt, has turned into the popular expression in the IT business today. Taking a gander at the potentials way it has on various business provisions and in the peoples' ordinary life. A large number of the peculiarities that make cloud system have tested the current security framework,...

    Provided By Academic Science

  • White Papers // Jul 2014

    Canopy Clustering: A Review on Pre-Clustering Approach to K-Means Clustering

    Many important problems involved in clustering large datasets. There are three different ways in which the dataset can be large: first, there can be a large number of elements in the dataset, second, each element can have many features, and third, there can be many clusters to discover. Here in...

    Provided By Academic Science

  • White Papers // Jul 2014

    A Review on Intrusion Detection System to Protect Cloud Data

    Cloud computing is a paradigm which allows the users to use the applications without installing them at their own end. With internet access, they can access their files at any computer. Different types of attacks such as denial of service attack and distributed denial of service attack makes the network...

    Provided By Academic Science

  • White Papers // Jul 2014

    A Review on Cloud to Handle and Process Big Data

    Cloud computing provides services to internet by utilizing resources of the computing infrastructure to provide different services of the internet. It allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. A distributed storage system for managing structured data at...

    Provided By Academic Science

  • White Papers // Jul 2014

    Optimized Performance of 2DPCA Approach in Face Recognition System

    Face recognition has become an important issue in many applications such as security systems, biometric identification, credit/debit card verification and criminal identification. Due to the varying nature of face images, a face recognition system meets various problems during the recognition process. PCA and their extensions are trying to solve issues...

    Provided By Academic Science

  • White Papers // Jun 2014

    A Predictive Channel Assignment Strategy for Cognitive Cellular Networks

    The evolution of wireless devices such as mobile phones has led to an ever increasing demand for the limited wireless spectrum. Cognitive radio is considered to be a promising technology to address the paradox of spectrum scarcity and spectrum under-utilization. This paper mainly focuses on integrating this cognitive radio technology...

    Provided By Academic Science

  • White Papers // Jun 2014

    Wireless Sensor Network (WSN) Simulation Framework Using MatLab Software

    A wireless sensor network consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Wireless Sensor Networks (WSNs) have attracted much attention in recent years. The potential applications of WSNs are immense. They are used for collecting, storing...

    Provided By Academic Science

  • White Papers // Jun 2014

    Forecasting Flood Situation by Environmental Changes using Wireless Sensor Network

    ZigBee is a wireless network standard for various sensor networks. Wireless sensor networks are an active research topic for recent years. The recent release of standards in the field, such as IEEE 802.15.4 and ZigBee, bring the technology out of research labs and stimulated the development of large commercial products....

    Provided By Academic Science

  • White Papers // Jun 2014

    Wi-Fi Offloads in LTE Networks

    Now-a-days, cellular networks are overloaded by mobile data traffic because of fast growth rate of mobile broadband subscriptions and the vigorous use of Smartphone. One of the prominent solutions to alleviate this problem is the offloading of mobile data traffic from primary access technology to the Wi-Fi infrastructure. Wi-Fi access...

    Provided By Academic Science

  • White Papers // Jun 2014

    Information Security Analysis of Wi-Fi Networks

    The potential of wireless communications has resulted into a vast expansion of wireless networks. However, the vulnerabilities and threats that wireless networks are subjected to have resulted into higher risk by unauthorized users to access the computer networks. The proposed comprehensive measures are to resolve Wi-Fi network security based on...

    Provided By Academic Science

  • White Papers // Jun 2014

    Recital Analysis of FTP Server on a Confined Router

    A computer network is a set of devices connected by communication links that allow sharing of resources and information. The transmission media can be divided into two broad categories: wired and wireless. Wired media include twisted-pair cable, coaxial cable, and fiber-optic cable. Wired networks are an interconnection of remote nodes...

    Provided By Academic Science

  • White Papers // Dec 2013

    Analysis and Study of Task Allocation Strategies on Multiple Processor Systems

    In this paper the authors present a communication-less multi-agent task allocation procedure that allows agents to use past experience to make non-greedy decisions about task assignments. Experimental results are given for troubles where agents have varying capabilities, tasks have varying difficulties, and agents are unaware of what tasks they will...

    Provided By Academic Science

  • White Papers // Jan 2014

    Association Rule Mining Using Particle Swarm Optimization

    Data mining is the process of discovering new relevant information in terms of patterns from large amount of data. Association rule mining is one of very important data mining techniques. Swarm optimization is a new subfield of artificial intelligence which studies the cooperative performance of simple agents. In this paper,...

    Provided By Academic Science

  • White Papers // Jan 2014

    Data Security Analysis in Cloud Environment: A Review

    Cloud computing is a new standard provided that software and hardware resources according to the customers' needs. Security of data in cloud is one of the key challenges which acts as an obstacle in the implementation of cloud computing. In this paper included brief analysis on data security in cloud...

    Provided By Academic Science

  • White Papers // Feb 2014

    Off-Line Rate-Monotonic Scheduling for Reduced Energy Consumption Using a Multiprocessor System

    In this paper the authors proposed about minimizing energy consumption for known periodic preemptive hard real-time tasks which are scheduled on a multiprocessor platform with dynamic voltage scaling capability. Mainly the partitioned scheduling and rate-monotonic priorities concepts are assigned on the tasks. It show that the problem is NP-hard in...

    Provided By Academic Science

  • White Papers // Feb 2014

    Implementation and Management of framework for PaaS in Cloud Computing

    With the rapid development of Internet and cloud computing, there are more and more network resources. Sharing, management and on-demand allocation of network resources are particularly important in cloud computing. IaaS (Infrastructure-as-a-Service), as the name suggests, provides the computing infrastructure, physical or (quite often) virtual machines and other resources like...

    Provided By Academic Science

  • White Papers // Mar 2014

    Identity Based Cryptography in Mobile Phone Communication

    The use of mobile phones has increased widely with time, and so is the need of security while communication. The integrity and confidentiality in communication over the mobile network via messaging and calls have been compromised and hence these services require high security level in these services. This paper proposes...

    Provided By Academic Science

  • White Papers // Mar 2014

    Storage Security in Cloud Computing Using RSA

    Cloud computing provides a virtual pool of services and resources. A user can hire these services on the pay-per-use basis from various cloud service providers to adhere the services related to network, storage, applications, software, etc. Many organizations upload their large databases on the cloud to liberate the overhead of...

    Provided By Academic Science

  • White Papers // Mar 2014

    Android as Operating System

    Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android's mobile operating system is based on a modified version of the Linux kernel. Another aspect that is important to consider when using Android is its own Virtual Machine (VM) environment. Android applications...

    Provided By Academic Science

  • White Papers // Mar 2014

    Comparative Study of Hierarchical Clustering over Partitioning Clustering Algorithm

    With huge amount of information available, it is not possible to take the full advantage of the World Wide Web without having a proper framework to search through the available data. The size of web has increased exponentially over the past few years with thousands of documents related to a...

    Provided By Academic Science

  • White Papers // Apr 2014

    Issues in Cloud Computing

    There is a critical need to securely store, manage, share and analyze massive amount of complex (e.g., semi-structured and structured) data to determine patterns and trends in order to improve the quality in business. In this paper security issues for the cloud computing is discussed and present a layered framework...

    Provided By Academic Science

  • White Papers // Apr 2014

    Cloud Computing Overview: Services and Features

    The cloud computing revolution is hitting full gear. Cloud computing is an inventive method that improves the services of distributed network. Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the clients requirement at specific time. This paper is...

    Provided By Academic Science

  • White Papers // Apr 2014

    Opinion Mining, Analysis and its Challenges

    Any user, buyer or customer rely on the Web for their opinions on various products and services which they have used, it is very important to develop methods to automatically classify and evaluate them. The task of classifying and analyzing such collective data together is known as customer feedback or...

    Provided By Academic Science

  • White Papers // Apr 2014

    Cloud Removal in High Resolution Satellite Images Using Discrete Wavelet Transform

    Satellite images playing a major role for monitoring earth changes in land covers such as forest, cities, agriculture, coastal area etc., but the major problem in the earth observation is the clouds in the satellite images. Thus cloud cover removal is very essential in the field of satellite imagery analysis....

    Provided By Academic Science

  • White Papers // Apr 2014

    Data Mining in Social Networking Sites : A Social Media Mining Approach to Generate Effective Business Strategies

    Mining social media is a new plan to boom business. The social media houses vast amount of user-generated data which can be used for data mining. Marketing enthusiasts are searching for means to utilize these mined business information for the intake of their sales/marketing and advertising teams. The mined information...

    Provided By Academic Science

  • White Papers // May 2014

    Data Storage in Cloud Computing

    Cloud computing is the computing technology which provides resources like software and hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud based data storage...

    Provided By Academic Science

  • White Papers // May 2014

    Analysis of Energy and Cost Scheduling Schemes in Cloud Computing

    Fundamental to cloud computing is subscription-based service where the people obtain networked storage space and computer resources. Computing power is provided in fully or para-virtualized manner i.e.in the form of leases to consumer. The major objective of cloud computing is to provide a reliable service keeping the energy and cost...

    Provided By Academic Science

  • White Papers // Dec 2013

    Intrusion Detection System for Manets

    Most of the networks are generally protected using firewalls and encryption techniques. But many of them are not sufficient and effective. With the propagation of computer networks extending boundaries, MANET has emerged as a new frontier of technology to provide anytime, anywhere communication. Absolute security is very hard to achieve...

    Provided By Academic Science

  • White Papers // Jan 2014

    Scheduling in Grid Computing - a Review

    Scheduling of tasks in grid computing belongs to a class of problems known as NP-hard problems. Grid is an infrastructure that enables sharing, selection and aggregation of wide variety of resources that are geographically distributed and owned by different organization to solve large scale computational and data intensive problems in...

    Provided By Academic Science

  • White Papers // Mar 2014

    Big Data and its Ethical Issues related to Human Aspects

    One of the implications of amassing information, especially about people and their behaviors is what the author calling big data's \"Forcing function\". It is pushing the people - whether they like it or not to consider serious ethical issues including whether certain uses of big data violate fundamental civil, social,...

    Provided By Academic Science

  • White Papers // Mar 2014

    Intrernet Intrusion Detection System Service in a \"Cloud\"

    Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and...

    Provided By Academic Science

  • White Papers // Mar 2014

    Oracle Database in Cloud Computing

    Databases area focus on data management issues in pervasive computing environments, digital libraries, data integration and interoperation, citation analysis, and large scale image databases. The research has been supported by the national science foundation, department of homeland security, and the U.S. department of defence. Research results have applicability to diverse...

    Provided By Academic Science

  • White Papers // Mar 2014

    A Smart Texting System for Android Users

    Short Message Service (SMS) is preferred over voice calls. SMS is a text messaging service component of phone, web, or mobile communication systems. It uses standardized communications protocols to allow fixed line or mobile phone devices to exchange short text messages. Most of the users like to use SMS instead...

    Provided By Academic Science

  • White Papers // Mar 2014

    Cloud Testing: A Next Generation Test Technology

    Cloud computing has changed the way of obtaining computer resources, methodology of managing and delivering computing services, technologies and solutions. To ensure high quality of cloud applications under development, developer must perform cloud testing to examine the quality and accuracy of cloud applications. In this paper, the authors address a...

    Provided By Academic Science

  • White Papers // Mar 2014

    Review on Security Levels of Datawarehouse

    Database integrity has a major goal of the maintaining the internal consistency of the data in the database. The database system has to maintain internal consistency, variety & velocity of data. It is observed by many users for security concern. And it is a minimal requirement for the database system...

    Provided By Academic Science

  • White Papers // Mar 2014

    Database Testing

    Databases are a collection of interconnected files on a server, storing information. They deal with different type of data i.e. databases are inhomogeneous. Databases are an important asset for many businesses. Thus, it is important to test a database in order to obtain a database system which satisfies the ACID...

    Provided By Academic Science

  • White Papers // Mar 2014

    Insider Attack: A Threat To Cloud Computing

    Cloud computing is becoming popular due to its ability to access business applications irrespective of geographical. Cloud service providers offer an opportunity for organizations to make resources available online by reducing costs of hardware and software. With increasing reliability it is important to ensure security. Insider attack in cloud computing...

    Provided By Academic Science

  • White Papers // Mar 2014

    Overview of Proxy Server

    A proxy server is a network tool that clients to make indirect network connections to other network services. A client connects to the proxy, and then requests for connection, for file, or other resource available on a various server. The proxy provides the resource either by connecting to the given...

    Provided By Academic Science

  • White Papers // Apr 2014

    Automatic Extraction of Data From Deep Web Page

    There is large volume of information available to be mined from the World Wide Web. The information on the Web is contained in the form of structured and unstructured objects, which is known as data records. Such data records are important because essential information are available in these host pages,...

    Provided By Academic Science

  • White Papers // May 2014

    High Performance Computing With Clouds

    Many computational problems in science and engineering require the most powerful computers available today. The widespread deployment of multicore and many core architectures has highlighted the need to exploit parallel computing techniques. Research in High Performance Computing (HPC) spans algorithms, software, tools and applications that exploit modern HPC platforms ranging...

    Provided By Academic Science

  • White Papers // Dec 2013

    Enhancing Data Security by Classifying Data on the Basis of Objective or Department

    Information mining carries a great deal of profits to organizations, social order, governments and also single person. Information mining is depicted as a procedure of run across or concentrating intriguing learning from a lot of information archived in different information sources, single person. Business information is gathered dangerously every moment...

    Provided By Academic Science

  • White Papers // Jan 2014

    Information Detection in Large Image Databases: Dealing With Doubts in Ground Truth

    In this paper the authors talk about the issue of learning finding in picture databases with specific concentrate on the issues which emerge when supreme ground truth is not accessible. The issue of looking the magellan picture information set so as to immediately place and index little volcanoes on the...

    Provided By Academic Science

  • White Papers // Feb 2014

    Design of UPS using SoC Technology

    In this paper the authors present the designing of an UPS using PSoC technology. Uninterruptible Power Supplies (UPS) play an important role in interfacing critical loads such as computers, communication system, medical/life support system, and industry control to the utility power grid. They are designed to provide clean and continuous...

    Provided By Academic Science

  • White Papers // Feb 2014

    Performance Analysis of 480 Gbps High Speed Data Transmission in Second Window Using DSF Fiber

    A growing number of optical transmission application areas require features such as: small size, limited power consumption, low latency, low cost, line rates > 20 Gb/s and distance up to few dozen kilometers. Here the authors propose the 1310 nm wavelength domain to realize high capacity, low cost and low...

    Provided By Academic Science

  • White Papers // Mar 2014

    Data Mining and Its Technique - A Review

    In an organizational culture where substantial amount of data is assembled and accumulated every day, this paper explains how the advanced field of data mining can be used for extracting or \"Mining\" knowledge from large amounts of data. The application of this technology within an organization leads to great benefits...

    Provided By Academic Science

  • White Papers // Mar 2014

    ZIGBEE-An Advanced Wireless Sensor Network

    The emergence of cross vendor industry standards has produced a number of affordable wireless solutions that are growing in popularity with business and sophisticated applications where network wiring is impossible. ZigBee, a Low Rate-Wireless Personal Area Network (LR-WPAN) based on IEEE 802.15.4 standard has been proposed to interconnect simple, low...

    Provided By Academic Science

  • White Papers // Mar 2014

    Android Operating System

    Cellular telephony has had a significant worldwide rate of acceptance, by year 2010 it is estimated that 3.5B of the 6.s8B people in the planet will have access to a cell phone. Smartphone devices such as iPhone, Blackberry, and those that support the Android operating system are progressively making an...

    Provided By Academic Science

  • White Papers // Mar 2014

    Wireless Networking Through ZigBee Technology and Comparative Study of Short Range Wireless Communication

    ZigBee is an IEEE 802.15.4 standard for data communications dealing consumer devices and business. It has been designed for low power consumption enabling batteries to last forever. The ZigBee standard provides security, application, and network support services operating on top of the IEEE 802.15.4 Medium Access Control (MAC) and physical...

    Provided By Academic Science

  • White Papers // Apr 2014

    Optimization of Industry using Zigbee based Networks

    ZigBee is a specification for a suite of high level communication protocols using tiny, low-power digital radios based on an IEEE 802 standard for personal area networks. Zigbee based hierarchical networks for supervisory industrial process control is a highly advanced technique to automate the industry in a way that object...

    Provided By Academic Science

  • White Papers // May 2014

    Transimpedance Amplifier Based on Inductive Peaking Techniques for Broadband Data Transmission

    A cross-coupled current conveyor base transimpedance amplifier implemented to obtain the input capacitance load insensitivity effect is introduced. The proposed architecture is designed using 0.12μm 1.2-V technology with on-chip spiral inductor as shunt peaking element and parasitic element are compensated for achieving high gain at minimum tailored input. The measured...

    Provided By Academic Science

  • White Papers // Jan 2015

    Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review

    Today, cloud computing systems are providing a wide variety of services and interfaces to which different service providers are now renting out spaces on their physical machines at an hourly rate. A cloud data center is an infrastructure that supports Internet services with wide coverage. Cloud computing is rapidly changing...

    Provided By Academic Science