AIRCC

Displaying 1-40 of 272 results

  • White Papers // Apr 2014

    Design an Efficient Big Data Analytic Architecture for Retrieval of Data Based on Web Server in Cloud Environment

    Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in...

    Provided By AIRCC

  • White Papers // Apr 2014

    Modeling a Geo-Spatial Database for Managing Travelers' Demand

    The geo-spatial database is a new technology in database systems which allow storing, retrieving and maintaining the spatial data. In this paper, the authors seek to design and implement a geo-spatial database for managing the traveler's demand with the aid of open-source tools and object-relational database package. The building of...

    Provided By AIRCC

  • White Papers // Apr 2014

    Query Optimization in OODBMS: Identifying Subquery for Query Management

    In this paper the authors approach for query optimization in object databases, which uses query decomposition and cached query results to improve execution a query. Issues that are focused here is fast retrieval and high reuse of cached queries, decompose query into sub query, decomposition of complex queries into smaller...

    Provided By AIRCC

  • White Papers // Apr 2014

    Performance Evaluation of Transaction Processing in Mobile Data Base Systems

    Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate. This is due the fact that the ACID properties of transactions are not simply followed, in particular the consistency property. Thus, transaction management models adopting weaker form of consistency are needed and these models can now tolerate...

    Provided By AIRCC

  • White Papers // Apr 2014

    Genetic-Fuzzy Process Metric Measurement System for an Operating System

    Operating System (OS) is the most essential software of the computer system, deprived of it; the computer system is totally useless. It is the frontier for assessing relevant computer resources. It performance greatly enhances user overall objective across the system. Related literatures have try in different methods and techniques to...

    Provided By AIRCC

  • White Papers // Mar 2014

    Enhancing the Impregnability of Linux Servers

    Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture (SOA). As a response to the current trend, all the IT firms are adopting business models such as cloud based services which rely on reliable and highly available server platforms. Linux servers are known to be highly secure....

    Provided By AIRCC

  • White Papers // Mar 2014

    Prediction of Quality Features in Iberian Ham by Applying Data Mining on Data From MRI and Computer Vision Techniques

    In this paper the authors aim to predict quality features of Iberian hams by using non-destructive methods of analysis and data mining. Iberian hams were analyzed by Magnetic Resonance Imaging (MRI) and Computer Vision Techniques (CVT) throughout their ripening process and physico-chemical parameters from them were also measured. The obtained...

    Provided By AIRCC

  • White Papers // Mar 2014

    Accurate Time Series Classification Using Shapelets

    Time series data are sequences of values measured over time. One of the most recent approaches to classification of time series data is to find shapelets within a data set. Time series shapelets are time series subsequences which represent a class. In order to compare two time series sequences, existing...

    Provided By AIRCC

  • White Papers // Feb 2014

    Developing a New Architecture to Improve ITSM on Cloud Computing Environment

    Cloud computing is the fundamental change in technology at the moment. According to its many advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service. Most organization are moved toward the cloud computing, since this environment is conceived service-oriented and many IT services...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Spatial Data Model for Moving Object Databases

    Moving object databases will have significant role in geospatial information systems as they allow users to model continuous movements of entities in the databases and perform spatio-temporal analysis. For representing and querying moving objects, algebra with a comprehensive framework of user defined types together with a set of functions on...

    Provided By AIRCC

  • White Papers // Feb 2014

    Methodological Study of Opinion Mining and Sentiment Analysis Techniques

    Decision making both on individual and organizational level is always accompanied by the search of other's opinion on the same. With tremendous establishment of opinion rich resources like, reviews, forum discussions, blogs, micro-blogs, Twitter etc. provide a rich anthology of sentiments. This user generated content can serve as a benefaction...

    Provided By AIRCC

  • White Papers // Feb 2014

    Security & Privacy Issues of Cloud & Grid Computing Networks

    Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies. Cloud computing has become a significant technology in field of information technology. Security of confidential data is a very important area of concern as it can make way for very big problems if unauthorized...

    Provided By AIRCC

  • White Papers // Feb 2014

    Different Applications of Programmable Logic Controller (PLC)

    Early Programming Logic Control (PLC) was designed to replace relay logic systems. These PLCs were programmed in \"Ladder Logic\", which strongly resembles a schematic diagram of relay logic. Programming logic control has several features like protection from the open area conditions such dust, heat and cold. PLC also has the...

    Provided By AIRCC

  • White Papers // Feb 2014

    Survey of Network Anomaly Detection Using Markov Chain

    Recently an internet threat has been increased. The authors' motive is detect the intrusion in the network in concise. The real time issue such as DoS attack in banking, companies, industries and organization have been increased significantly IDS has been used in both server and host side. The major challenge...

    Provided By AIRCC

  • White Papers // Feb 2014

    Comparison of Document Management Systems by Meta Modeling and Workforce Centric Tuning Measures

    Document management software are used widely for office paper management and related workflows. However, they have some differences from a flexibility perspective for the needs of workers. Moreover, they also differentiate in their underlying conceptual design. In this paper, a set (eight) of widely used document management systems are chosen...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce

    Big data analysis has now become an integral part of many computational and statistical departments. Analysis of peta-byte scale of data is having an enhanced importance in the present day scenario. Big data manipulation is now considered as a key area of research in the field of data analytics and...

    Provided By AIRCC

  • White Papers // Jan 2014

    A Novel Steganographic Scheme Based on Hash Function Coupled With AES Encryption

    In the present scenario, the use of images increased extremely in the cyber world so that the authors can easily transfer data with the help of these images in a secured way. Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused...

    Provided By AIRCC

  • White Papers // Jan 2014

    Cloud Computing and Security Issues in the Cloud

    Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing...

    Provided By AIRCC

  • White Papers // Jan 2014

    Generating Data Warehouse Schema

    A data warehouse is an integrated set of data, derived basically from operational data to use in decision making strategy and business intelligence using OnLine Analytical Processing (OLAP) techniques. Most of the creation of data multidimensional data warehouses is done manually, but it is a very complex and takes a...

    Provided By AIRCC

  • White Papers // Jan 2014

    Building a Collective-Experience Engine for Experience-Transfer Amongst Web Users

    The Web has had several evolutions of knowledge-expertise expression on the Web. In this paper the authors describe the Collective Experience Engine (CEE), a system for indexing experiential-knowledge about Web knowledge-sources (websites), and performing relative-experience calculations between participants of the CEE. The CEE provides an in-browser interface to query the...

    Provided By AIRCC

  • White Papers // Dec 2013

    New Approaches With Chord in Efficient P2P Grid Resource Discovery

    Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows the users' to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports...

    Provided By AIRCC

  • White Papers // Dec 2013

    Ontology Driven Knowledge Map for Enhancing Business Process Reengineering

    It has been a constant human desire to be dissatisfied with the status quo as there is always need to improve upon the way business is being done. As a result, business process reengineering is introduced into organization in order to overcome these challenges of inefficiencies and high running cost....

    Provided By AIRCC

  • White Papers // Dec 2013

    A Proficient 5C Approach to Boost The Security in the SaaS Model's Technical Architectural Components

    For anything that involves delivering hosted services over the internet is cloud computing. These services are classified as: IaaS, SaaS and PaaS. This paper focuses on SaaS security measures. SaaS is a cloud based productivity suite that helps the business people to connect and work from anywhere on any device....

    Provided By AIRCC

  • White Papers // Dec 2013

    Score Based Deadline Constrained Workflow Scheduling Algorithm for Cloud Systems

    Cloud computing is the latest and emerging trend in information technology domain. It offers utility-based IT services to user over the Internet. Workflow scheduling is one of the major problems in cloud systems. A good scheduling algorithm must minimize the execution time and cost of workflow application along with QoS...

    Provided By AIRCC

  • White Papers // Dec 2013

    Front End Data Cleaning And Transformation In Standard Printed Form Using Neural Models

    Front end of data collection and loading into database manually may cause potential errors in data sets and a very time consuming process. Scanning of a data document in the form of an image and recognition of corresponding information in that image can be considered as a possible solution of...

    Provided By AIRCC

  • White Papers // Nov 2013

    Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    Behavioral biometrics is a scientific study with the primary purpose of identifying the authenticity of a user based on the way they interact with an authentication mechanism. While association based password authentication is a cognitive model of authentication system. The work done shows the implementation of keyboard latency technique for...

    Provided By AIRCC

  • White Papers // Nov 2013

    Cloud Computing Technology for Egovernment Architecture

    The evolution of cloud computing has had a significant effect on the people lives and it has brought many benefits. Cloud computing is a style of computing which is formed from the aggregation and development of technologies such as grid computing distributed computing, parallel computing and service-oriented architecture and its...

    Provided By AIRCC

  • White Papers // Nov 2013

    Improving Data Transmission in the Vanet Using Multi-Criteria Decision Making Method Based on Fuzzy Logic

    In vehicular ad-hoc networks the packets are sent using multi-hop methods and the receiving limit of a message is gradually extended, but the exponential increment of the number of nodes re-broadcasting a message results in broadcast storm problem in data broadcasting in this case. Some characteristics like high speed of...

    Provided By AIRCC

  • White Papers // Nov 2013

    Novel Text Categorization by Amalgamation of Augmented K-Nearest Neighbourhoodclassification and K-Medoids Clustering

    Machine learning for text classification is the underpinning of document cataloging, news filtering, document steering and exemplification. In text mining realm, effective feature selection is significant to make the learning task more accurate and competent. One of the traditional lazy text classifier k-Nearest Neighborhood (kNN) has a major pitfall in...

    Provided By AIRCC

  • White Papers // Nov 2013

    Analysis & Prediction of Sales Data in Sap-ERP System Using Clustering Algorithms

    Clustering is an important data mining technique where the authors will be interested in maximizing intra-cluster distance and also minimizing inter-cluster distance. They have utilized clustering techniques for detecting deviation in product sales and also to identify and compare sales over a particular period of time. Clustering is suited to...

    Provided By AIRCC

  • White Papers // Oct 2013

    Network Traffic Adaptation for Cloud Games

    With the arrival of cloud technology, game accessibility and ubiquity have a bright future; games can be hosted in a centralize server and accessed through the Internet by a thin client on a wide variety of devices with modest capabilities: cloud gaming. However, current cloud gaming systems have very strong...

    Provided By AIRCC

  • White Papers // Oct 2013

    A Security Model for Cloud Computing Based on Autonomous Biological Agents

    Besides many advantages which cloud computing create, there are different concerns such as security. In this paper, the conceptual model based on Biological Immune System (BIS) will be proposed in order to create security in cloud computing. BIS have several features such as distributed computing, self organizing, self-learning that are...

    Provided By AIRCC

  • White Papers // Oct 2013

    Cloud Computing Performance Evaluation: Issues and Challenges

    Cloud computing makes the dream of computing real as a tool and in the form of service. This internet - based on-going technology which has brought flexibility, capacity and power of processing has realized service-oriented idea and has created a new ecosystem in the computing world with its great power...

    Provided By AIRCC

  • White Papers // Oct 2013

    Survey on Caching and Replication Algorithm for Content Distribution in Peer to Peer Networks

    In this paper, the authors focus on caching and replication algorithm for content distribution in peer to peer networks. Caching and replication is a key strategy for improve the reliability, availability, and performance in peer to peer networks. This paper gives a brief introduction to caching, replication and various algorithms...

    Provided By AIRCC

  • White Papers // Sep 2013

    Cloud Computing Challenges and Solutions

    Cloud computing is an emerging area of computer technology that benefits from the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet users requirements and applications. It can...

    Provided By AIRCC

  • White Papers // Sep 2013

    Predicting Students' Performance Using ID3 and C4.5 Classification Algorithms

    An educational institution needs to have an approximate prior knowledge of enrolled students to predict their performance in future academics. This helps them to identify promising students and also provides them an opportunity to pay attention to and improve those who would probably get lower grades. As a solution, the...

    Provided By AIRCC

  • White Papers // Sep 2013

    Column-Store Databases: Approaches and Optimization Techniques

    Database system storage technology is mainly composed by Column-Stores (CS) and Row-Stores (RS). Currently, the majority of popular database products use RS, i.e. to store each record's attributes together, such as Microsoft SQL Server, Oracle and so on. Column-Stores database stores data column-by-column. The need for Column-Stores database arose for...

    Provided By AIRCC

  • White Papers // Sep 2013

    Security Analysis of Generalized Confidentialmodulation for Quantum Communication

    The authors propose a new evaluation method for 'Generalized Confidential Modulation (GCM)' for quantum communication. Confidential modulation realizes a secret communication by using secret information for modulation and noise in a channel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluation methods for GCM...

    Provided By AIRCC

  • White Papers // Sep 2013

    Text Classification for Authorship Attribution Analysis

    Authorship attribution mainly deals with undecided authorship of literary texts. Authorship attribution is useful in resolving issues like uncertain authorship, recognize authorship of unknown texts, spot plagiarism so on. Statistical methods can be used to set apart the approach of an author numerically. The basic methodologies that are made use...

    Provided By AIRCC

  • White Papers // Sep 2013

    Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm

    Network Intrusion Detection System (NIDS) is one that scans the network activities in a computer environment, and detects the intrusions or attacks. Then, the system administrator may be alerted to the take the corrective actions. With the ever increasing amount of new attacks in today's world the amount of data...

    Provided By AIRCC

  • White Papers // May 2011

    Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment

    In multiple data sources environment where open access is to be provided to the users not known to the system, the credential based access control has emerged as a suitable approach for achieving security on shared data. Mediation techniques have been developed for data integration that provide a single unified...

    Provided By AIRCC

  • White Papers // May 2011

    Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN

    In a real application area, the WSN is not a homogeneous network where the nodes are maintained in respective coordinate position relatively same to each other. But rather homogeneous it should be heterogeneous, where the relative positional difference for different nodes are different. In this paper a better scheme is...

    Provided By AIRCC

  • White Papers // May 2011

    Transformation From Identity Stone Age to Digital Identity

    Technological conversion, political interests and Business drivers has triggered a means, to establish individual characterization and personalization. People started raising concerns on multiple identities managed across various zones and hence various solutions were designed. Technological advancement has brought various issues and concerns around Identity assurance, privacy and policy enabled common...

    Provided By AIRCC

  • White Papers // May 2011

    Energy-Efficient Routing Protocol for Homogeneous Wireless Sensor Networks

    A Wireless Sensor Network (WSN) is composed of sensor nodes spread over the field to sense the data. The sensed data must be gathered & transmitted to Base Station (BS) for end user queries. The used sensor nodes being in-expensive having low computation power & limited energy so are not...

    Provided By AIRCC

  • White Papers // May 2011

    Towards an Enhanced Semantic Approach Based on Formal Concept Analysis and Lift Measure

    The volume of stored data increases rapidly. Therefore, the battery of extracted association heavily prohibits the better support of the decision maker. In this context, backboned on the Formal Concept Analysis, the authors propose to extend the notion of Formal Concept through the generalization of the notion of itemset aiming...

    Provided By AIRCC

  • White Papers // Jun 2011

    Spectrum Sensing Techniques in Cognitive Radio Networks: A Survey

    The growing demand of wireless applications has put a lot of constraints on the usage of available radio spectrum which is limited and precious resource. However, a fixed spectrum assignment has lead to under utilisation of spectrum as a great portion of licensed spectrum is not effectively utilised. Cognitive radio...

    Provided By AIRCC

  • White Papers // May 2011

    A Symmetric Token Routing for Secured Communication of MANET

    The communication should be much secured in Mobile Adhoc Networks in the protective environment such as Military atmosphere and in a disaster relief. Due to the attackers, Mobile Adhoc Networks resulting in denial of Service attacks modify packets, Error packets, Missing Packets, Theft of Nodes, etc. To overcome this problem,...

    Provided By AIRCC

  • White Papers // May 2011

    Efficient Packet Delivery Approach for Adhoc Wireless Networks

    A wireless ad-hoc network is a collection of nodes which are self-configuring, connected by wireless links. The nodes are free to move randomly and organize themselves arbitrarily; thus, the network's topology may change rapidly and unpredictably. These kinds of networks are very flexible and they do not require any existing...

    Provided By AIRCC

  • White Papers // Jul 2011

    Evaluation of Proactive, Reactive and Hybrid Ad Hoc Routing Protocol for IEEE 802.11 MAC and 802.11 DCF in VANET Using QUALNET

    In VANET high speed is the real characteristic which leads to frequent breakdown, interference etc. Therefore Performance of adhoc routing protocols is helpful to improve the Quality of Service (QOS). In this paper, the authors studied various adhoc routing protocols, Reactive, Proactive & Hybrid, taking in to consideration parameters like...

    Provided By AIRCC

  • White Papers // Dec 2012

    Optimal Task Partitioning Model in Distributed Heterogeneous Parallel Computing Environment

    Parallel computing systems compose task partitioning strategies in a true multiprocessing manner. Such systems share the algorithm and processing unit as computing resources which leads to highly inter process communications capabilities. The authors focus on real-time and non preemptive systems. A large variety of experiments have been conducted on the...

    Provided By AIRCC

  • White Papers // Nov 2010

    Probabilistic Broadcasting Protocol In AD HOC Network And Its Advancement: A Review

    Broadcasting is a fundamental operation in MANETs where a source node transmits a message that is to be disseminated to all the nodes in the network. Broadcasting is categorized into deterministic and probabilistic schemes. This paper reviews the probabilistic broadcasting protocol because of its adaptability in changing environment. Probabilistic broadcasting...

    Provided By AIRCC

  • White Papers // Nov 2010

    Multi Tree Data Base Architecture for Location Tracking in Next Generation Mobile Network

    The next-generation mobile network will support terminal mobility, personal mobility, and service provider portability, making global roaming seamless. A location-independent Personal Telecommunication Number (PTN) scheme is conducive to implementing such a global mobile system. In this paper, firstly the authors propose multi tree database architecture consists of a number of...

    Provided By AIRCC

  • White Papers // Feb 2011

    WIMAX Basics from PHY Layer to Scheduling and Multicasting Approaches

    WiMAX (Worldwide Interoperability for Microwave Access) is an emerging broadband wireless technology for providing Last mile solutions for supporting higher bandwidth and multiple service classes with various quality of service requirement. The unique architecture of the WiMAX MAC and PHY layers that uses OFDMA to allocate multiple channels with different...

    Provided By AIRCC

  • White Papers // Feb 2011

    Overview and Challenges of Overlay Networks: A Survey

    Nowadays, a very useful platform is becoming widely used to deploy new services and applications in the Internet: the overlay networks. These networks create a virtual topology on top of existing ones with the purpose of providing several different services such as file sharing or content delivery. This survey focuses...

    Provided By AIRCC

  • White Papers // Feb 2011

    A Survey on Routing Mechanism and Techniques in Vehicle to Vehicle Communication (VANET)

    Now a day, one of the most attractive research topics in the area of Intelligent Traffic Control is Inter vehicle communication. In V2V communication it is also called VANET i.e. vehicular ad-hoc network; a vehicle can communicate to its neighboring vehicles even in the absence of a central Base Station....

    Provided By AIRCC

  • White Papers // May 2011

    One Time Secret Key Mechanism for Mobile Communication

    Mobile communication is playing a vital role in the current technical world and becoming more popular and prevalent across the world everyday at one end and many security problems are arising at the other end. To overcome these security problems many security mechanisms for mobile communications have been introduced in...

    Provided By AIRCC

  • White Papers // May 2011

    Dual Band Two Elements Inverted-L Antenna for 3.5 & 5 Ghz Mobile Wimax/Wi-Fi Applications

    This paper presents the numerical simulations of dual band two elements Inverted-L antenna for 3.5 GHz mobile WiMAX and 5 GHz Wi-Fi operation. The proposed antenna is feed by a coaxial connector. The antenna arms effectively control the excited resonant modes for Wi-Fi and mobile WiMAX operation. Total area occupies...

    Provided By AIRCC

  • White Papers // Aug 2011

    Energy Efficient Mac Protocols for Wireless Sensor Networks: A Survey

    Use of Wireless sensor networks has been widely seen in the fields of target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. In wireless sensor networks nodes work with an incomplete power source, energy efficient operations in an important factor of the nodes in wireless sensor network....

    Provided By AIRCC

  • White Papers // Aug 2011

    Analysis of Recent Check Pointing Techniques for Mobile Computing Systems

    Recovery from transient failures is one of the prime issues in the context of distributed systems. These systems demand to have transparent yet efficient techniques to achieve the same. Checkpoint is defined as a designated place in a program where normal processing of a system is interrupted to preserve the...

    Provided By AIRCC

  • White Papers // Aug 2011

    Defending Wormhole Attack in Wireless Ad-hoc Network

    The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of ad hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison...

    Provided By AIRCC

  • White Papers // Apr 2012

    Energy Efficient Recognition Protocol for Ad Hoc Networks

    The recognition is a new security principle closely related to authentication. Low-power ad hoc networks with no pre-deployment information require the less authoritative security in recognition. The authors have studied previously proposed low-power protocols according to the environment and security model presented. They have implemented the New Message Recognition Protocol...

    Provided By AIRCC

  • White Papers // Apr 2012

    The Proposal of Hybrid Intrusion Detection for Defence of Sync Flood Attack in Wireless Sensor Network

    Data security is a huge responsibility for sensor network as there are various ways in which security can be breached, enabling hackers to access sensitive data. Threats to wireless sensor networks are numerous and potentially devastating. Security issues ranging from session hijacking to Denial of Service (DOS) can plague a...

    Provided By AIRCC

  • White Papers // Jun 2012

    Security in Wireless Sensor Networks - Improving the LEAP Protocol

    Wireless sensor networks are becoming significantly vital to many applications, and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are very defenseless to security threats. Due to the fact that these networks are susceptible to hackers; it is...

    Provided By AIRCC

  • White Papers // Nov 2012

    The Risk Assessment and Treatment Approach in Order to Provide Lan Security Based on ISMS Standard

    Local Area Networks(LAN) at present become an important instrument for organizing of process and information communication in an organization. They provides important purposes such as association of large amount of data, hardware and software resources and expanding of optimum communications. Because these network do work with valuable information, the problem...

    Provided By AIRCC

  • White Papers // Oct 2012

    DSR Routing Decisions for Mobile Ad Hoc Networks using Fuzzy Inference System

    Mobile ad-hoc network technology has gained popularity in recent years by researchers on account of its flexibility, low cost and ease of deployment. The objective of this paper is to model the behavior of MANET for DSR protocol by considering some prominent routing metrics. These metrics (packet delivery fraction, normalized...

    Provided By AIRCC

  • White Papers // Oct 2012

    Real-Time Routing Protocols for Wireless Sensor Networks: A Survey

    Wireless sensor networks can be termed as a new generation of distributed embedded systems that has a capability of meeting broad range of real-time applications. Examples include radiation monitoring, fire monitoring, border surveillance, and medical care to name but a few. Wireless sensor networks that are deployed in time/mission-critical applications...

    Provided By AIRCC

  • White Papers // Oct 2012

    Impact of Contention Window on Congestion Control Algorithms for Wireless Ad Hoc Networks

    TCP congestion control mechanism is highly dependent on MAC layer Back-off algorithms that predict the optimal Contention Window size to increase the TCP performance in wireless ad hoc network. This paper critically examines the impact of Contention Window in TCP congestion control approaches. The modified TCP congestion control method gives...

    Provided By AIRCC

  • White Papers // Oct 2012

    Dynamic Channel Allocation Scheme to Handle Hand-Off in Wireless Mobile Network

    The rapid growth in the demand for mobile communications has led to an intense research effort to achieve an efficient use of the scarce spectrum allocated for cellular communications. In this paper, the authors devise a new scheme DCAS (Dynamic Channel Allocation Scheme) for call admission control. In this new...

    Provided By AIRCC

  • White Papers // Oct 2012

    A Study of Power Saving Technique in Wireless Networks

    Much research on wireless networks have focused on the power consumption of the wireless nodes, while at the same time how to acquire power from ambient environment is another direction to extend the battery lifetime. Though, mostly extending the lifetime of WSNs rely on making the electronic circuitry power efficient...

    Provided By AIRCC

  • White Papers // Oct 2012

    Evolution of Wireless Mobile Communication Networks and Future of Cellular Market in India

    In this paper, the authors discuss the evolution of the mobile communication systems from GSM to LTE (2G to 4G) and the trends in the mobile communication industry. The Global System for Mobile Communication (GSM) is a well established cellular system targeted here due to its engineering success and the...

    Provided By AIRCC

  • White Papers // Oct 2012

    A Novel Approach for Energy Efficient Hierarchy Based Routing in Sensor Networks

    Wireless Sensor Network (WSN) is the collection of many micro-sensor nodes, connecting each other by a wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment, detecting and reporting events. In this paper, the authors have proposed an algorithm for hierarchy based protocols of wireless sensor networks,...

    Provided By AIRCC

  • White Papers // Oct 2012

    Next Generation 4G WiMAX Networks - IEEE 802.16 Standard

    This paper gives an overview about the various PHY and MAC layer specification which define the IEEE 802.16 standard and which define the Fixed WiMAX (Ver. 802.16d-2004) and Mobile WiMAX (Ver. 802.16e-2005) network scenarios. The authors also discuss about the various updates in the Advanced Air Interface update (802.16m -...

    Provided By AIRCC

  • White Papers // Aug 2010

    Neural Network Based Energy Efficiency in Wireless Sensor Networks: A Survey

    The main concern in Wireless Sensor Networks is how to handle with their limited energy resources. The performance of Wireless Sensor Networks strongly depends on their lifetime. As a result, Dynamic Power Management approaches with the purpose of reduction of energy consumption in sensor nodes, after deployment and designing of...

    Provided By AIRCC

  • White Papers // Jun 2012

    Cross Layer Protocols for Multimedia Transmission in Wireless Networks

    Wireless networks initially inherited the traditional layered architecture from wired networks. Nevertheless, as third and fourth generation wireless communications and networking begin to proliferate in the area of communication networks, the suitability of the layered architecture is coming under close scrutiny from the research community. It is repeatedly argued that...

    Provided By AIRCC

  • White Papers // Aug 2012

    A Survey on Target Tracking Techniques in Wireless Sensor Networks

    Target Tracking as it moves through a sensor network has become an increasingly important application in Wireless Sensor Networks. This paper examines some of the target tracking techniques in use today. An analysis of each technique is presented along with it advantages, problems and possible improvements. There are seven main...

    Provided By AIRCC

  • White Papers // Dec 2012

    A Survey of Wireless Sensor Network Architectures

    A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors that cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion, or pollutants, at different locations. Recent advances in low-power highly-integrated electronics, advances in Micro-Electro-Mechanical Systems (MEMS), rapid growth in the type and quality of available...

    Provided By AIRCC

  • White Papers // Jul 2009

    Collision-Aware Adaption of Contention Window in 802.11E Wireless LAN

    One of the key challenges in designing a Quality of Service (QOS) scheme for IEEE 802.11 Wireless LANs (WLANS) is reducing collisions and improving throughput. Existed Adaptive contention windows mechanisms can reduce collisions of all traffic. However, adaptive contention window algorithms cannot guarantee the absolute priority of the high-priority traffic....

    Provided By AIRCC

  • White Papers // Jul 2009

    Multi Channel MAC for Wireless Sensor Networks

    In this paper, Sensor Multi Channel (SMC) Medium Access Control (MAC) has been proposed for wireless sensor networks. The SMC MAC uses a dedicated control channel and multiple data channels. The effective solution for the multi channel hidden terminal problem and missing receiver problem has been proposed in this work....

    Provided By AIRCC

  • White Papers // Jul 2009

    An Efficient MAC Protocol Based on Hybrid Superframe for Wireless Sensor Networks

    Designing low energy consumption, high efficiency Media Access Control (MAC) protocols are one of the most important directions in wireless sensor networks (WSN). In this paper, the authors proposed a new contention reserve MAC protocol, named CRMAC, under the inspiration of IEEE 802.15.4's superframe structure. CRMAC is a MAC protocol...

    Provided By AIRCC

  • White Papers // Jul 2009

    Trust Based Clustering and Secure Routing Scheme for Mobile Ad Hoc Networks

    In this paper the authors present a distributed self-organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on...

    Provided By AIRCC