AICIT

Displaying 1-40 of 1598 results

  • White Papers // Sep 2010

    Proposing A Comprehensive Storage Virtualization Architecture With Related Verification For Data Center Application

    A successful IT Company is characterized by its ability to put the right information in front of the right decision-makers at the right time while concerns about security issues. These objectives require a strategy for reducing the costs, minimizing the risks, and enabling an agile management system. But existing solutions...

    Provided By AICIT

  • White Papers // Aug 2010

    An Approach of Location Management in GSM Using GIS

    This paper provides with an easy to understand, step-by-step approach to location determination and management - crucial knowledge for exploiting location as a value-added service enabler for mobile communications. It presents a model of location management of Mobile Station (MS) using Geographic Information System (GIS) in GSM (Global System Module)...

    Provided By AICIT

  • White Papers // Aug 2010

    Performance Analysis of DS-CDMA Over a Non Fading Channel With Perfect Power Control Under Different Processing Gain

    Code Division Multiple Access (CDMA) is a well known access technology in which all the users share the spread spectrum. Again one of the most important challenges with respect to wireless access is to combat with fading and interference. CDMA is the technique that is more efficient to overcome frequency...

    Provided By AICIT

  • White Papers // Aug 2010

    A Study and Analysis of Channel Modeling for the Ultra Wide Band Wireless Body Area Network

    Future Communication systems will be driven by the concept that how every one can be connected from anywhere at any time. An essential part of this concept is Wireless Body Area Network (WBAN) approach by which services are constantly available and the best use of this WBAN is health monitoring....

    Provided By AICIT

  • White Papers // Aug 2010

    Fingerprint Identification and Verification System by Minutiae Extraction Using Artificial Neural Network

    The proposed Fingerprint Identification and verification System is biometric identification methodology that uses digital imaging technology to obtain, store, and analyze fingerprint data. Here the authors want introduced a new method for fingerprint identification technology by minutiae feature extraction using back-propagation algorithm. For an input image, the local ridge orientation...

    Provided By AICIT

  • White Papers // Aug 2010

    Study of IP Over WDM Networks Using MPLS System

    Though enormous improvement has occurred in the field of transmission media layer for which gigantic amount of data can be transferred but there is bottleneck problem at the upper layer protocol stack so that eventually the data transmission process becomes slower. Data may be transferred by optical fiber as a...

    Provided By AICIT

  • White Papers // Aug 2010

    A Case Based Tool for Monitoring of Web Services Behaviors

    Monitoring systems is of great practical importance. The use of service oriented distributed system is increasing. Within Service Orientation (SO) Web Services (WS) are the de facto standard for implementing service-oriented systems. Users want uninterrupted service from service providers. So the management of these systems is becoming crucial. Monitoring is...

    Provided By AICIT

  • White Papers // Aug 2010

    A Survey on Sensor Network

    Sensor networks are recently rapidly growing research area in wireless communications and distributed network. Sensor network is a densely deployed wireless network of small, low-cost sensors, which can be used in various applications like - health, environmental monitoring, military, home, gathering and sensing information in inhospitable locations etc. Wireless sensor...

    Provided By AICIT

  • White Papers // Aug 2010

    Performance Analysis of Integrated Service Over Differentiated Service for Next Generation Internet

    This paper discusses on next generation Internet how the authors can provide Quality of Services (QoS) to the users while today's internet provides the BES (Best Effort Services), that does not guaranteed the QoS. Here, the authors proposed an internet service for next generation internet where integrated and differentiated services...

    Provided By AICIT

  • White Papers // Aug 2010

    Query Optimization on Relational Databases for Supporting Top-k Query Processing Techniques

    Information systems apply various techniques to rank query answers. Ranking queries (Or top-k queries) are dominant in many emerging applications, e.g., similarity queries in multimedia databases, searching web databases, midlewares and data mining. In such application domains, end-users are more interested in the most important (Top-k) query answers in the...

    Provided By AICIT

  • White Papers // Jan 2012

    Capacity Improvement of Space Time Block Code Spatial Modulation for Three Transmit Antennas

    The main two requirements for next generation communication systems are high data rate and high reliable communication. Spectral efficiency is viable because systems are band limited and user's demands are growing continuously. Application of Multiple Input Multiple Output (MIMO) technique is the best technique to improve link capacity, and potentially...

    Provided By AICIT

  • White Papers // Jan 2012

    A New Parallel Concatenated Coding Transceiver System Using Three Convolutional-Interleaver Sections

    Channel coding is an important stage in any communication system and is used for improving the Bit Error Rate (BER) performance in wireless digital communication systems in various communication channels such as the Additive White Gaussian Noise (AWGN), Rayleight, Ricean channels, and so on. One of the important types of...

    Provided By AICIT

  • White Papers // Nov 2011

    Integrated Disaster Alert Network Gateway

    According to complexity of society, disaster has been complicated. Also a variety of disasters including natural, man-made, and social disasters has been happened frequently due to climate changes by industrialization, carelessness and misuse of human, terror, and war. Although, rapid integrated issue by disaster manager is very important for expeditious...

    Provided By AICIT

  • White Papers // Apr 2010

    Kalman Filter Estimation of the Number of Competing Terminals in an IEEE 802.11 Network Utilizing Error Pron-Channel

    Numerous applications of the Wireless Local Area Networks (WLANs) are sensitive to the state of the employed channel. Packet delay and throughput which are the crucial characteristic for almost all recent applications of the WLANs are sensitive to: number of associate stations in the network, amount of error in the...

    Provided By AICIT

  • White Papers // Jul 2010

    Adaptive Bandwidth Allocation Scheme for Cognitive Radios

    In recent past, cognitive radio has come out to as a promising solution to the spectrum scarcity problem. It tends to increase the spectrum utilization by making use of underutilized frequencies with the help of dynamic spectrum allocation technique. In this paper, the authors present one such scheme for bandwidth...

    Provided By AICIT

  • White Papers // Jul 2010

    Prediction Using Recurrent Neural Network Based Fuzzy Inference system by the Modified Bees Algorithm

    In this paper, Recurrent Neural network based fuzzy Inference System (RNFIS) for prediction is proposed. A recurrent network is embedded in the RNFIS by adding feedback connections in the second layer and in the output layer. In this paper, a hybrid learning algorithm is used to train the RNFIS model....

    Provided By AICIT

  • White Papers // Jul 2010

    Intelligent Integrated Management for Telecommunication Networks

    As the size of communication networks keeps on growing, faster connections, cooperating technologies and the divergence of equipment and data communications, the management of the resulting networks gets additional important and time-critical. More advanced tools are needed to support this activity. In this paper the authors describe the design and...

    Provided By AICIT

  • White Papers // Jul 2010

    Adding PC Connectivity to the MTS-88 Microcomputer Teaching System

    The MTS-88.c trainer is a training system targeting students in the microprocessors course. It has a built in single-line assembler allowing the users to enter programs in assembly. It has the problem that long programs cannot be traced and tested efficiently. A simple error may cause all the code to...

    Provided By AICIT

  • White Papers // Sep 2010

    The Migration of Mobile Agent using the Object Replication

    The migration method of a mobile agent affects the entire performance of the distributed system. Most of the existing migration methods have the slow-witted structures due to the fixed order migration that cause the subsequent accumulation of the task results. They can induce various problems such as the failure of...

    Provided By AICIT

  • White Papers // Aug 2010

    The Metatable of Naming Agent for the Naming Service of Sensor Network

    The node selection for the migration of a mobile agent depends on the content of the referenced metadata in the naming space. The reliability of the migrated information is determined by using the operation, cooperation, and metadata of individual agent in multi-agent system. In this paper, the authors propose the...

    Provided By AICIT

  • White Papers // Aug 2010

    Performance Enhancement of Wireless Communication Systems using Transmit and Receive Diversity

    In this paper, the authors describe the concatenation of Turbo/Convolutional codes with transmit and receive diversity schemes by using Space-Time Block Code. It is shown that, by using two transmit antennas and one/or two receive antenna, large coding gain for the bit error rate is achieved over the system without...

    Provided By AICIT

  • White Papers // Nov 2010

    An Efficient Certification Scheme for Nodes in a Wireless Ad Hoc Network

    The attractiveness of the wireless ad hoc networks lies in the fact that these networks are self-organized: the hosts constituting the networks can communicate with each other without reliance on any centralized or specified entities such as base stations or access points. With these networks finding more applications, the need...

    Provided By AICIT

  • White Papers // Dec 2010

    Empirical Study on Secure Routing Protocols in Wireless Sensor Networks

    Wireless Sensor Networks (WSN) is usually made by cooperation of number of limited sensor devices which are connected over the wireless media. There are a lot of its application in military, health and industry. Due to limitations of sensor devices, the networks exposed to various kinds of attacks and conventional...

    Provided By AICIT

  • White Papers // Oct 2011

    Adaptive Software Defined Radio Detection With Artificial Intelligence

    Distinguishing between different types of audio signals is a common, yet complex computational challenge. In many cases, accurate discrimination between different types of audio signals is essential to the function of many electronic devices. Traditional Digital Signal Processing (DSP) techniques for determining a signal's audio class require careful calibration by...

    Provided By AICIT

  • White Papers // Oct 2011

    Stepping into Augmented Reality

    This paper surveys AR (Augmented Reality) technology from various perspectives and it contains all the researcher needs to know when he starts searching in that topic. The authors present the ideal characteristics which realize an ultimate AR system. Basic components of AR system containing output components (vision, audition, touch, smell...

    Provided By AICIT

  • White Papers // Oct 2011

    Integration of WLAN and WiMAX With Base Station Assisted QoS Provisioning

    IEEE 802.11 is the WLAN standard for providing moderate to high speed data communication in a short range generally within a building. IEEE 802.16 (WiMAX) is the standard for broadband WMANs that provide the Internet access over a long range in outdoor environments. However, it is susceptible to fading inside...

    Provided By AICIT

  • White Papers // Oct 2011

    To Shift or Not to Shift: Maximizing the Efficiency of a Wireless Sensor Network

    In this paper, the authors address the efficient utilization of a Wireless Sensor Network (WSN) to improve the overall data throughput and to cut down the cost of running it. Sensor nodes closest to the sink node expend more energy as they send more routing messages, which decreases their life...

    Provided By AICIT

  • White Papers // Apr 2012

    Laplacian Faces: A Face Recognition Tool

    The purpose of this paper is face recognition. Human face recognition systems have gained a considerable attention during last few years. There are very few applications with respect to security, sensitivity and accuracy. Face recognition systems are built on computer programs that analyze images of human faces for the purpose...

    Provided By AICIT

  • White Papers // Apr 2012

    P-Recursion Information and Recursion Search Ring-Application

    The aim of this paper is to improve the generated manner of P-sets string to obtain a recursive structure of information. This paper proposes the concept of P-Recursion Information (Packet Recursion Information, PRI) by improving the generated manner of P-sets string into the recursion generated manner. PRI is composed of...

    Provided By AICIT

  • White Papers // Apr 2012

    A Semantic SOA Platform for Smart Home

    SOA is a well adopted architecture for Web Service organization, home services could also be organized by SOA through which the services could be accessed platform-independently. However, SOA does not describe the semantic of the service, so that the service retrieval would encounter ambiguous problems due to polysemy or synonym....

    Provided By AICIT

  • White Papers // Apr 2012

    Accountability for Data Integrity in Cloud Storage Service

    In an accountable storage service, actions on data are concluded to the original actors so that a faulty actor cannot avoid penalty, and actors are protected against false accusations of guilt. In this paper, the authors propose an efficient scheme for mutual accountability of data integrity between users and providers...

    Provided By AICIT

  • White Papers // Apr 2012

    RELO: A Robust, Efficient and Low-Cost Peer-to-Peer Overlay for Autonomic Communication

    The term Autonomic Communication (AC) refers to self-managing systems which are capable of supporting self-configuration, self-healing and self-optimization. To build an ideal system for autonomic communication, there are three key problems should be solved: how to maintain system structure stability in front of the dynamic topologies; how information can be...

    Provided By AICIT

  • White Papers // Apr 2012

    The Research of Software Project Risk Assessment With Triangular Fuzzy Information

    The problem of evaluating the software project risk with triangular fuzzy information is the Multiple Attribute Group Decision Making (MAGDM) problems. In this paper, the authors investigate the Multiple Attribute Group Decision Making (MAGDM) problems for evaluating the software project risk with triangular fuzzy information. They utilize the Triangular Fuzzy...

    Provided By AICIT

  • White Papers // Apr 2012

    A Study of MAC Protocols for WBANs Based on Markov Chain

    The IEEE 802.15.4 standard is specifically devised to support low power, low data rate in relation to Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal daily life activities. This monitoring requires the low-power operation medical sensor body area...

    Provided By AICIT

  • White Papers // Apr 2012

    Cooperative Jamming for Security of Two-Way Relay Wiretap Channel With Analog Network Coding

    This paper describes how eavesdropping can potentially be restrained by introducing cooperative jamming. A wiretap channel of two-way relay with Analog Network Coding (ANC) is considered, in which a transmitter sends message to its intended receiver in the presence of a passive eavesdropper and with the help of an active...

    Provided By AICIT

  • White Papers // Apr 2012

    Privacy-Preserving Top-K Query in Two-Tiered Wireless Sensor Networks

    In a two-tiered wireless sensor network, storage nodes act as an intermediate tier between sensors and the sink for storing data and processing queries. This architecture has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. On...

    Provided By AICIT

  • White Papers // Apr 2012

    An Innovate Dynamic Load Balancing Algorithm Based on Task Classification

    In a distributed system, the key factor affecting performance is between many nodes and nodes dynamic task allocation and scheduling, that is dynamic load balancing, so the technology of load balancing has higher value in theory study and practical applications. This paper considers users' task requests type is difference and...

    Provided By AICIT

  • White Papers // Apr 2012

    An Improved Anomaly Detection Method Based on Entropy Analysis for Large Scale Network Using Data Stream Technique

    Entropy-based approaches for anomaly detection are appealing since they provide more fine-grained insights than traditional traffic volume analysis. While previous work has demonstrated the benefits of entropy-based anomaly detection, there has been little effort to make entropy analysis more efficient on a large scale and high speed network. With the...

    Provided By AICIT

  • White Papers // Apr 2012

    A Novel Key Predistribution Scheme Using One-way Hash Function for Wireless Sensor Networks

    To achieve secure communication between sensor nodes in Wireless Sensor Networks (WSNs), it is important to be able to establish efficient key pre-distribution mechanism. In this paper, a novel key establishment scheme has been proposed to achieve both efficiency and security goal. The novelty of this approach lies in that,...

    Provided By AICIT

  • White Papers // Apr 2012

    Performance Comparison of Spatial Reused Bandwidth Reservation in Satellite Networks

    In this paper, the authors present a spatial reused bandwidth reservation scheme in Time Division Multiple Accesses (TDMA)-based uplink channel of satellite networks by using directional antennas. Directional antennas technology in wireless network provides the capability for considerable increase in spatial reuse, which can improve bandwidth utilization and satisfy the...

    Provided By AICIT