Academic Science

Displaying 1-40 of 180 results

  • White Papers // Jan 2015

    Associative Classifier for Software Fault Tolerance in presence of Class Imbalance

    Software fault prediction is crucial in reducing the overall cost for developing a software product and also to assure the quality of the finished software product. Different software quality models based on data mining techniques are in existence for identifying software-fault prone modules. However, the presence of class imbalance problem...

    Provided By Academic Science

  • White Papers // Jan 2015

    Security Using Cryptographic Techniques for Image Processing

    In this paper, the authors focus mainly on the different kinds of image security techniques. The digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are lots of other techniques which enhance the...

    Provided By Academic Science

  • White Papers // Jan 2015

    Inquiry Dispensation in Wireless Environments Based on Location

    Generally, in real world the answer for a particular realistic problem is based on the query of the inquirer. Similarly, there has been a growing interest in Spatial Queries Based on Location (SQBLs) refer to spatial queries whose answers depend on the location of the inquirer. Efficient processing of SQBLs...

    Provided By Academic Science

  • White Papers // Dec 2014

    Third Party Non-Intrusive Multilevel Authentication Framework for Virtual Desktop Infrastructure

    In today's networked world, the need to maintain information security is important and solutions to ensure the security are increasing day-by-day. A robust security is to be provided so as to protect the information. Cloud computing is the pr

    Provided By Academic Science

  • White Papers // Dec 2014

    Mobility Prediction in MANET Routing Using Genetic Algorithm

    Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Because of high mobility of nodes, the network topology of MANETs changes very fast, making it more difficult to find the routes that message packets use. This paper proposes a Genetic Algorithm (GA) based routing with...

    Provided By Academic Science

  • White Papers // Dec 2014

    A Security Mechanism for Cloud Computing Threats

    Cloud computing could be a platform for increasing capabilities and developing potentialities dynamically while not employing new infrastructure, personnel, or software package systems. In Addition, cloud computing originated from an advert enterprise idea, and developed into a flourishing IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to...

    Provided By Academic Science

  • White Papers // Dec 2014

    Voice Translation on Windows & Linux machine

    Voice translation tools provide services to convert words to target language using natural language processing. There are parsing methods which concentrate on capturing keywords & translating them to target language. Current techniques to optimize processing time are template matching, indexing the frequently used words using probability search and session-based cache....

    Provided By Academic Science

  • White Papers // Dec 2014

    Governing of Packet Droppers and Modifiers Attacks in HWSN

    A Wireless Sensor Network (WSN) is a large collection of sensor nodes with limited power Supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks...

    Provided By Academic Science

  • White Papers // Dec 2014

    Fuzzy Neural Network for Clustering and Classification

    Fuzzy Neural Network (FNN) has great advantage in clustering and classification. So in this paper the author introducing a fuzzy neural network for clustering and classification which consist of two training algorithm which combines the advantage of both fuzzy logic and neural network. First algorithm is General Fuzzy Min-Max neural...

    Provided By Academic Science

  • White Papers // Dec 2014

    Designing Metrics to Evaluate the Performance of Agent Oriented Software

    The characteristics of a software agent, such as social ability, pro-activity, reactivity, adaptability, mobility and goal orientation, depend mainly on their execution performance; and it is therefore not easy to measure them by using just static product metrics. The static metric as well as dynamic metrics are to be used...

    Provided By Academic Science

  • White Papers // Nov 2014

    Efficient Routing in Mobile Ad Hoc Networks

    MANET will have dynamic network topology and the nodes move frequently from their positions that lead to cause link failures, packet loss and network congestion, packet transmission rate also becomes low. Existing source routing protocols keep the network congested by flooding the network with route request packets sent for every...

    Provided By Academic Science

  • White Papers // Oct 2014

    DNS Server Cryptography Using Symmetric Key Cryptography

    Before discussing about DNS security extension it is important to know the whole DNS system. The Domain Name System (DNS) is a hierarchical distributed database that facilitates the conversion of human readable host names into IP address and vice versa. The security services are provided in DNS using DNSSEC system...

    Provided By Academic Science

  • White Papers // Sep 2014

    Investigation on Oracle Data Miner Purpose - Directed & Undirected

    The majority of businesses have a vast quantity of information, with an immense pact of information extract in it, \"Extracting\" is typically what it is doing: a great deal of information survive that it engulfs a usual way of information scrutiny. Data extracting affords a means to obtain the information...

    Provided By Academic Science

  • White Papers // Sep 2014

    Arduino Based Home Security System

    Security has becoming an important issue everywhere. Home security is becoming necessary now-a-days as the possibilities of intrusion are increasing day-by-day. In this paper, home security system has been designed that has a special feature and which make a dial with the owner of the house to inform that the...

    Provided By Academic Science

  • White Papers // Aug 2014

    Ability Software Testing Techniques in Cloud Computing

    Cloud computing is the next stage of the internet evolutions. Cloud computing is emerged as new technology in organization and cooperates. To successfully provide cloud services and sharing of resources, the cloud must be tested before came into service. Cloud testing is a form of testing in which web applications...

    Provided By Academic Science

  • White Papers // Aug 2014

    Feature Mining in Customer Reviews using Soft Computing

    Internet is the global system which growing very fast. It is most reliable and efficient one so that the use of internet is increasing in people's day-to-day life. Because of increasing social networking more and more people interact with each other and share their views, emotions, experiences, feedback and opinion...

    Provided By Academic Science

  • White Papers // Aug 2014

    Implementation of Control Transmission Power Features in AODV for Mobile Ad-hoc Network: A Simulation Study

    A mobile ad-hoc network is a wireless local area network which has no any fixed infrastructure. Node can communicate with another node that is immediately within their radio range or one that is outside their radio range not relying on access point. Since node in the mobile ad-hoc network has...

    Provided By Academic Science

  • White Papers // Aug 2014

    With High Level Fragmentation of Dataset, Load Balancing In Cloud Computing

    Cloud computing may be considered as another name for distributed computing by heterogeneous resources over a network, which use all the resources to compute the utility using virtualization technologies and real time communication networks for data transfers (usually over the internet). This gives the ability to run a program over...

    Provided By Academic Science

  • White Papers // Aug 2014

    Effectiveness of Automated Software Testing as a Web Service

    In this paper, the authors make the effectiveness of automated software testing as a web service. They have three types of testing as a web service: very first is programmer's test their code efficiently with less number of resources. A home edition testing service for consumers to test the software...

    Provided By Academic Science

  • White Papers // Aug 2014

    Web Applications Security - A Deep Analysis

    Web applications are one of the most prominent platforms for information and services delivery over Internet now-a-days. As they are increasingly used for critical services, web applications become a popular and valuable target for security attacks. Although a large body of techniques has been developed to attack web applications and...

    Provided By Academic Science

  • White Papers // Aug 2014

    Performance Evaluation of WDM-RoF System Based on CO-OFDM using Dispersion Compensation Technique

    In this paper, the authors presented a system design that integrates Coherent-Optical-Orthogonal-Frequency-Division Multiplexing (CO-OFDM) with Wavelength-Division Multiplexing - Radio over Fiber (WDM-RoF) together with dispersion compensation technique to offer a data rate of 48Gbps over more than 80km Single Mode Fiber (SMF) by multiplexing four 12Gbps OFDM channels. In the...

    Provided By Academic Science

  • White Papers // Aug 2014

    Microcontroller Based Wireless Automatic Antenna Positioning System

    The automatic antenna positioning system primarily functions to identify the source of signal. The signal may be of any type and any kind, it automatically identifies the presence of a particular signal and the antenna will remain stationary as long as the signal link is established. Whenever the signal link...

    Provided By Academic Science

  • White Papers // Jul 2014

    A Study of Various Web Content Mining Techniques and Tools

    With the spectacularly and unpredictable growth of information available over the Internet, WWW has become a powerful platform for storage & retrieval of information. Due to the heterogeneity & unstructured nature of data on WWW, searching of information is becoming cumbersome & time consuming task. Web mining came as solution...

    Provided By Academic Science

  • White Papers // Jul 2014

    Measuring Standard Software Quality Efficiency for Web Applications

    The growth of information on the Web is growing at a speed rate. With this increase in growth rate of information on web, many web based application have combined on Web. Web is a way which provides a same opportunity to all organization's products. The structure of the web contains...

    Provided By Academic Science

  • White Papers // Jul 2014

    Cloud-computing: Challenges, Security and Solutions Using, SaaS

    Cloud-computing, without a doubt, has turned into the popular expression in the IT business today. Taking a gander at the potentials way it has on various business provisions and in the peoples' ordinary life. A large number of the peculiarities that make cloud system have tested the current security framework,...

    Provided By Academic Science

  • White Papers // Jul 2014

    Canopy Clustering: A Review on Pre-Clustering Approach to K-Means Clustering

    Many important problems involved in clustering large datasets. There are three different ways in which the dataset can be large: first, there can be a large number of elements in the dataset, second, each element can have many features, and third, there can be many clusters to discover. Here in...

    Provided By Academic Science

  • White Papers // Jul 2014

    A Review on Intrusion Detection System to Protect Cloud Data

    Cloud computing is a paradigm which allows the users to use the applications without installing them at their own end. With internet access, they can access their files at any computer. Different types of attacks such as denial of service attack and distributed denial of service attack makes the network...

    Provided By Academic Science

  • White Papers // Jul 2014

    A Review on Cloud to Handle and Process Big Data

    Cloud computing provides services to internet by utilizing resources of the computing infrastructure to provide different services of the internet. It allows consumers and businesses to use applications without installation and access their personal files at any computer with internet access. A distributed storage system for managing structured data at...

    Provided By Academic Science

  • White Papers // Jul 2014

    Optimized Performance of 2DPCA Approach in Face Recognition System

    Face recognition has become an important issue in many applications such as security systems, biometric identification, credit/debit card verification and criminal identification. Due to the varying nature of face images, a face recognition system meets various problems during the recognition process. PCA and their extensions are trying to solve issues...

    Provided By Academic Science

  • White Papers // Jun 2014

    Wireless Sensor Network (WSN) Simulation Framework Using MatLab Software

    A wireless sensor network consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Wireless Sensor Networks (WSNs) have attracted much attention in recent years. The potential applications of WSNs are immense. They are used for collecting, storing...

    Provided By Academic Science

  • White Papers // Jun 2014

    Forecasting Flood Situation by Environmental Changes using Wireless Sensor Network

    ZigBee is a wireless network standard for various sensor networks. Wireless sensor networks are an active research topic for recent years. The recent release of standards in the field, such as IEEE 802.15.4 and ZigBee, bring the technology out of research labs and stimulated the development of large commercial products....

    Provided By Academic Science

  • White Papers // Jun 2014

    Wi-Fi Offloads in LTE Networks

    Now-a-days, cellular networks are overloaded by mobile data traffic because of fast growth rate of mobile broadband subscriptions and the vigorous use of Smartphone. One of the prominent solutions to alleviate this problem is the offloading of mobile data traffic from primary access technology to the Wi-Fi infrastructure. Wi-Fi access...

    Provided By Academic Science

  • White Papers // Jun 2014

    Information Security Analysis of Wi-Fi Networks

    The potential of wireless communications has resulted into a vast expansion of wireless networks. However, the vulnerabilities and threats that wireless networks are subjected to have resulted into higher risk by unauthorized users to access the computer networks. The proposed comprehensive measures are to resolve Wi-Fi network security based on...

    Provided By Academic Science

  • White Papers // Jun 2014

    Recital Analysis of FTP Server on a Confined Router

    A computer network is a set of devices connected by communication links that allow sharing of resources and information. The transmission media can be divided into two broad categories: wired and wireless. Wired media include twisted-pair cable, coaxial cable, and fiber-optic cable. Wired networks are an interconnection of remote nodes...

    Provided By Academic Science

  • White Papers // Jun 2014

    Designing and Analysis of Hairpin Filter Using 2.44GHz

    Hairpin filter is one of the most popular microwave frequency filters because of it is compact and does not require grounding. The filter is designed at center frequency of 2.44GHz with a fractional bandwidth of 3.45%. This frequency is presenting for wireless LAN application and operates in the ISM band...

    Provided By Academic Science

  • White Papers // Jun 2014

    Implementation of RSA and ECC Security Protocols for Wireless Sensor Networks

    Application of Wireless Sensor Network (WSN) is increasing in a rapid speed. As sensor networks may interact with sensitive data and operate in hostile unattended environments, it is imperative that security concern be addressed from the beginning of the system. But sensor networks also introduce severe resource constraints due to...

    Provided By Academic Science

  • White Papers // Jun 2014

    Routing Protocols to Save and Balance Energy for Wireless Sensor Network using Fuzzy Set

    Wireless sensor networks are used in different application like civil and military. Many routing protocols have been proposed to find suitable to transmit data. Most of energy aware routing protocols reduce energy consumption and often provide energy balancing. These protocols optimize or decrease the energy consumption of the network. Energy...

    Provided By Academic Science

  • White Papers // Jun 2014

    Wireless Sensor Network for Campus Monitoring

    Wireless sensor network is one of the emerging technologies which can be used for a variety of monitoring applications. With a focus on campus monitoring, this paper proves the capability of wireless sensor network for complete automated HVAC system and street light monitoring system. A complete functional system consisting of...

    Provided By Academic Science

  • White Papers // Jun 2014

    Efficient Hiding of Sensitive Association Rules for Incremental Datasets

    With the amount of data doubling every three days, data mining is becoming an increasingly important tool to transform this data into information. In recent years, the use of data mining techniques and related applications has increased a lot as it is used to extract important knowledge from large amount...

    Provided By Academic Science

  • White Papers // Jun 2014

    Providing Resilience against Sinkhole Attacks in Wireless Sensor Networks using Cryptographic Protocols

    Wireless sensor networks are vulnerable to adversaries as they are deployed in open and unattended environments. There are many methods proposed for the detection and prevention of such kind of attacks. The authors propose two new cryptographic protocols of different complexity and strength, hence avoiding network failure caused by sinkhole...

    Provided By Academic Science

  • White Papers // Mar 2014

    Android as Operating System

    Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android's mobile operating system is based on a modified version of the Linux kernel. Another aspect that is important to consider when using Android is its own Virtual Machine (VM) environment. Android applications...

    Provided By Academic Science

  • White Papers // Mar 2014

    Comparative Study of Hierarchical Clustering over Partitioning Clustering Algorithm

    With huge amount of information available, it is not possible to take the full advantage of the World Wide Web without having a proper framework to search through the available data. The size of web has increased exponentially over the past few years with thousands of documents related to a...

    Provided By Academic Science

  • White Papers // Apr 2014

    Issues in Cloud Computing

    There is a critical need to securely store, manage, share and analyze massive amount of complex (e.g., semi-structured and structured) data to determine patterns and trends in order to improve the quality in business. In this paper security issues for the cloud computing is discussed and present a layered framework...

    Provided By Academic Science

  • White Papers // Apr 2014

    Cloud Computing Overview: Services and Features

    The cloud computing revolution is hitting full gear. Cloud computing is an inventive method that improves the services of distributed network. Cloud computing is an on demand service in which distributed resources, information, software and other devices are provided according to the clients requirement at specific time. This paper is...

    Provided By Academic Science

  • White Papers // Apr 2014

    Opinion Mining, Analysis and its Challenges

    Any user, buyer or customer rely on the Web for their opinions on various products and services which they have used, it is very important to develop methods to automatically classify and evaluate them. The task of classifying and analyzing such collective data together is known as customer feedback or...

    Provided By Academic Science

  • White Papers // Apr 2014

    Cloud Removal in High Resolution Satellite Images Using Discrete Wavelet Transform

    Satellite images playing a major role for monitoring earth changes in land covers such as forest, cities, agriculture, coastal area etc., but the major problem in the earth observation is the clouds in the satellite images. Thus cloud cover removal is very essential in the field of satellite imagery analysis....

    Provided By Academic Science

  • White Papers // Apr 2014

    Data Mining in Social Networking Sites : A Social Media Mining Approach to Generate Effective Business Strategies

    Mining social media is a new plan to boom business. The social media houses vast amount of user-generated data which can be used for data mining. Marketing enthusiasts are searching for means to utilize these mined business information for the intake of their sales/marketing and advertising teams. The mined information...

    Provided By Academic Science

  • White Papers // May 2014

    Data Storage in Cloud Computing

    Cloud computing is the computing technology which provides resources like software and hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Cloud based data storage...

    Provided By Academic Science

  • White Papers // May 2014

    Analysis of Energy and Cost Scheduling Schemes in Cloud Computing

    Fundamental to cloud computing is subscription-based service where the people obtain networked storage space and computer resources. Computing power is provided in fully or para-virtualized manner i.e.in the form of leases to consumer. The major objective of cloud computing is to provide a reliable service keeping the energy and cost...

    Provided By Academic Science

  • White Papers // Dec 2013

    Intrusion Detection System for Manets

    Most of the networks are generally protected using firewalls and encryption techniques. But many of them are not sufficient and effective. With the propagation of computer networks extending boundaries, MANET has emerged as a new frontier of technology to provide anytime, anywhere communication. Absolute security is very hard to achieve...

    Provided By Academic Science

  • White Papers // Jan 2014

    Scheduling in Grid Computing - a Review

    Scheduling of tasks in grid computing belongs to a class of problems known as NP-hard problems. Grid is an infrastructure that enables sharing, selection and aggregation of wide variety of resources that are geographically distributed and owned by different organization to solve large scale computational and data intensive problems in...

    Provided By Academic Science

  • White Papers // Mar 2014

    Big Data and its Ethical Issues related to Human Aspects

    One of the implications of amassing information, especially about people and their behaviors is what the author calling big data's \"Forcing function\". It is pushing the people - whether they like it or not to consider serious ethical issues including whether certain uses of big data violate fundamental civil, social,...

    Provided By Academic Science

  • White Papers // Mar 2014

    Intrernet Intrusion Detection System Service in a \"Cloud\"

    Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. It is defined as a computer network system to collect information on a number of key points, and analyze this information to see whether there are violations of network security policy behavior and...

    Provided By Academic Science

  • White Papers // Mar 2014

    Oracle Database in Cloud Computing

    Databases area focus on data management issues in pervasive computing environments, digital libraries, data integration and interoperation, citation analysis, and large scale image databases. The research has been supported by the national science foundation, department of homeland security, and the U.S. department of defence. Research results have applicability to diverse...

    Provided By Academic Science

  • White Papers // Dec 2013

    Analysis and Study of Task Allocation Strategies on Multiple Processor Systems

    In this paper the authors present a communication-less multi-agent task allocation procedure that allows agents to use past experience to make non-greedy decisions about task assignments. Experimental results are given for troubles where agents have varying capabilities, tasks have varying difficulties, and agents are unaware of what tasks they will...

    Provided By Academic Science

  • White Papers // Jan 2014

    Association Rule Mining Using Particle Swarm Optimization

    Data mining is the process of discovering new relevant information in terms of patterns from large amount of data. Association rule mining is one of very important data mining techniques. Swarm optimization is a new subfield of artificial intelligence which studies the cooperative performance of simple agents. In this paper,...

    Provided By Academic Science

  • White Papers // Jan 2014

    Data Security Analysis in Cloud Environment: A Review

    Cloud computing is a new standard provided that software and hardware resources according to the customers' needs. Security of data in cloud is one of the key challenges which acts as an obstacle in the implementation of cloud computing. In this paper included brief analysis on data security in cloud...

    Provided By Academic Science

  • White Papers // Feb 2014

    Off-Line Rate-Monotonic Scheduling for Reduced Energy Consumption Using a Multiprocessor System

    In this paper the authors proposed about minimizing energy consumption for known periodic preemptive hard real-time tasks which are scheduled on a multiprocessor platform with dynamic voltage scaling capability. Mainly the partitioned scheduling and rate-monotonic priorities concepts are assigned on the tasks. It show that the problem is NP-hard in...

    Provided By Academic Science

  • White Papers // Feb 2014

    Implementation and Management of framework for PaaS in Cloud Computing

    With the rapid development of Internet and cloud computing, there are more and more network resources. Sharing, management and on-demand allocation of network resources are particularly important in cloud computing. IaaS (Infrastructure-as-a-Service), as the name suggests, provides the computing infrastructure, physical or (quite often) virtual machines and other resources like...

    Provided By Academic Science

  • White Papers // Mar 2014

    Identity Based Cryptography in Mobile Phone Communication

    The use of mobile phones has increased widely with time, and so is the need of security while communication. The integrity and confidentiality in communication over the mobile network via messaging and calls have been compromised and hence these services require high security level in these services. This paper proposes...

    Provided By Academic Science

  • White Papers // Mar 2014

    Storage Security in Cloud Computing Using RSA

    Cloud computing provides a virtual pool of services and resources. A user can hire these services on the pay-per-use basis from various cloud service providers to adhere the services related to network, storage, applications, software, etc. Many organizations upload their large databases on the cloud to liberate the overhead of...

    Provided By Academic Science

  • White Papers // Dec 2013

    Smartphone Tracking Application Using Short Message Service

    Smartphone users are increasing rapidly in this ICT enabled society. With the phenomenal growth of Smartphone usage, the burglary of such tiny device is also increasing. Smartphone are easily lost, stolen or misplaced. Security is one of the main concerns for Smartphone users today. This paper proposes a model to...

    Provided By Academic Science

  • White Papers // Jan 2014

    Selective Forwarding Attack in LEACH in WSN

    Wireless sensor network comprises of hundreds or thousands of sensor nodes to sense the environment collect data and send these data to a central location known as base station or sink. Sensor networks are very useful in many application such as military applications, environmental condition detection, whether prediction, measuring temperature,...

    Provided By Academic Science

  • White Papers // May 2014

    A Comparative Study of Quality of Services in Ad-hoc Routing Protocols

    Wireless network is a collection of hosts forming a network on the fly, using a fixed infrastructure. But wireless ad-hoc network is self configured network, without any fixed infrastructure. Some features of ad-hoc wireless networks are lack of central control, mobility of hosts, dynamically changing network topology, and limited availability...

    Provided By Academic Science

  • White Papers // Jan 2015

    Associative Classifier for Software Fault Tolerance in presence of Class Imbalance

    Software fault prediction is crucial in reducing the overall cost for developing a software product and also to assure the quality of the finished software product. Different software quality models based on data mining techniques are in existence for identifying software-fault prone modules. However, the presence of class imbalance problem...

    Provided By Academic Science

  • White Papers // Jan 2015

    Security Using Cryptographic Techniques for Image Processing

    In this paper, the authors focus mainly on the different kinds of image security techniques. The digital techniques for transmitting and storing images are increasing, it becomes an important issue that how to protect the confidentiality, integrity and authenticity of images. There are lots of other techniques which enhance the...

    Provided By Academic Science

  • White Papers // Jan 2015

    Inquiry Dispensation in Wireless Environments Based on Location

    Generally, in real world the answer for a particular realistic problem is based on the query of the inquirer. Similarly, there has been a growing interest in Spatial Queries Based on Location (SQBLs) refer to spatial queries whose answers depend on the location of the inquirer. Efficient processing of SQBLs...

    Provided By Academic Science

  • White Papers // Dec 2014

    Third Party Non-Intrusive Multilevel Authentication Framework for Virtual Desktop Infrastructure

    In today's networked world, the need to maintain information security is important and solutions to ensure the security are increasing day-by-day. A robust security is to be provided so as to protect the information. Cloud computing is the pr

    Provided By Academic Science

  • White Papers // Dec 2014

    Mobility Prediction in MANET Routing Using Genetic Algorithm

    Mobile Ad-hoc NETwork (MANET) is a self-organized system comprised by multiple mobile wireless nodes. Because of high mobility of nodes, the network topology of MANETs changes very fast, making it more difficult to find the routes that message packets use. This paper proposes a Genetic Algorithm (GA) based routing with...

    Provided By Academic Science

  • White Papers // Dec 2014

    A Security Mechanism for Cloud Computing Threats

    Cloud computing could be a platform for increasing capabilities and developing potentialities dynamically while not employing new infrastructure, personnel, or software package systems. In Addition, cloud computing originated from an advert enterprise idea, and developed into a flourishing IT invention. Despite the plug surrounding cloud computing, customers stay reluctant to...

    Provided By Academic Science

  • White Papers // Dec 2014

    Voice Translation on Windows & Linux machine

    Voice translation tools provide services to convert words to target language using natural language processing. There are parsing methods which concentrate on capturing keywords & translating them to target language. Current techniques to optimize processing time are template matching, indexing the frequently used words using probability search and session-based cache....

    Provided By Academic Science

  • White Papers // Dec 2014

    Governing of Packet Droppers and Modifiers Attacks in HWSN

    A Wireless Sensor Network (WSN) is a large collection of sensor nodes with limited power Supply and constrained computational capability. Due to the restricted communication range and high density of sensor nodes, packet forwarding in sensor networks is usually performed through multi-hop data transmission. Therefore, routing in wireless sensor networks...

    Provided By Academic Science

  • White Papers // Dec 2014

    Fuzzy Neural Network for Clustering and Classification

    Fuzzy Neural Network (FNN) has great advantage in clustering and classification. So in this paper the author introducing a fuzzy neural network for clustering and classification which consist of two training algorithm which combines the advantage of both fuzzy logic and neural network. First algorithm is General Fuzzy Min-Max neural...

    Provided By Academic Science

  • White Papers // Dec 2014

    Designing Metrics to Evaluate the Performance of Agent Oriented Software

    The characteristics of a software agent, such as social ability, pro-activity, reactivity, adaptability, mobility and goal orientation, depend mainly on their execution performance; and it is therefore not easy to measure them by using just static product metrics. The static metric as well as dynamic metrics are to be used...

    Provided By Academic Science

  • White Papers // Apr 2014

    Comparative Study of the Performance of Microstrip Circular Patch Antenna With and Without Slots

    In this paper, the authors report on the simulation studies of microstrip circular patch antenna with and without slot. The antennas have been designed for 2-8GHz frequency band. Bakelite with dielectric constant of 4.5 has been chosen as substrate. The feed locations of (3.5, 1) and (1, -9.5) are the...

    Provided By Academic Science

  • White Papers // Apr 2014

    Li-Fi: A New Paradigm in Wireless Communication

    Li-Fi is a new wireless communication technology which enables a wireless data transmission through LED light. Li-Fi is based on a unique ability of solid state lighting systems to create a binary code of 1s and 0s with a LED flickering that is invisible for human eyes. Data can be...

    Provided By Academic Science

  • White Papers // Mar 2014

    Artificial Intelligence: Imagine a World in Which People Talk to Machines

    So far as the laws of mathematics refer to reality, they are not certain. And so far as they are certain, they do not refer to reality. Communication is the basic phenomena in the nature. By vary means, all species communicate to each other. The languages are nothing but a...

    Provided By Academic Science

  • White Papers // Mar 2014

    Genetic Algorithm Used for Improved Power Control in Wireless Ad-Hoc Network

    In recent years, there has been explosion of activities in area of wireless network. Wireless communication is one of the fastest growing technologies. Unlicensed frequency bands are used by the wireless LANs. To see a wireless LAN in homes around the world is very common today. Their unplanned consumption has...

    Provided By Academic Science

  • White Papers // Mar 2014

    Analysis of Ultra Wide Band Swastik-Slot Loaded Microstrip Antenna for Wireless Applications

    In this paper a microstrip antenna loading with swastik slot is designed. Here, the shape of patch is rectangular and partial ground plane is used. The antenna designing is done by using HFSS simulation tool. Feeding is done by using microstrip feed line. After designing antenna the authors see the...

    Provided By Academic Science

  • White Papers // Mar 2014

    Biometric and its Techniques

    In this paper, the authors represent biometric authentication techniques and actual deployment potential together with an independent testing of various biometric authentication products and technologies. Biometric authentication is the process of using a unique physical or behavioral trait as a method to confirm identity and determine the access profile of...

    Provided By Academic Science