AIRCC

Displaying 1-40 of 270 results

  • White Papers // Apr 2014

    Genetic-Fuzzy Process Metric Measurement System for an Operating System

    Operating System (OS) is the most essential software of the computer system, deprived of it; the computer system is totally useless. It is the frontier for assessing relevant computer resources. It performance greatly enhances user overall objective across the system. Related literatures have try in different methods and techniques to...

    Provided By AIRCC

  • White Papers // Apr 2014

    Modeling a Geo-Spatial Database for Managing Travelers' Demand

    The geo-spatial database is a new technology in database systems which allow storing, retrieving and maintaining the spatial data. In this paper, the authors seek to design and implement a geo-spatial database for managing the traveler's demand with the aid of open-source tools and object-relational database package. The building of...

    Provided By AIRCC

  • White Papers // Apr 2014

    Query Optimization in OODBMS: Identifying Subquery for Query Management

    In this paper the authors approach for query optimization in object databases, which uses query decomposition and cached query results to improve execution a query. Issues that are focused here is fast retrieval and high reuse of cached queries, decompose query into sub query, decomposition of complex queries into smaller...

    Provided By AIRCC

  • White Papers // Apr 2014

    Performance Evaluation of Transaction Processing in Mobile Data Base Systems

    Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate. This is due the fact that the ACID properties of transactions are not simply followed, in particular the consistency property. Thus, transaction management models adopting weaker form of consistency are needed and these models can now tolerate...

    Provided By AIRCC

  • White Papers // Apr 2014

    Design an Efficient Big Data Analytic Architecture for Retrieval of Data Based on Web Server in Cloud Environment

    Cloud has been a computational and storage solution for many data centric organizations. The problem today those organizations are facing from the cloud is in data searching in an efficient manner. A framework is required to distribute the work of searching and fetching from thousands of computers. The data in...

    Provided By AIRCC

  • White Papers // Apr 2014

    Design and Implementation of a Personal Super Computer

    Resources of personal devices, whether mobile or stationary, can be productively leveraged to service their users. By doing so, personal users will be able to ubiquitously run relatively complex computational jobs, which cannot be accommodated in their individual personal devices or while they are on the move. To this end,...

    Provided By AIRCC

  • White Papers // Mar 2014

    Enhancing the Impregnability of Linux Servers

    Worldwide IT industry is experiencing a rapid shift towards Service Oriented Architecture (SOA). As a response to the current trend, all the IT firms are adopting business models such as cloud based services which rely on reliable and highly available server platforms. Linux servers are known to be highly secure....

    Provided By AIRCC

  • White Papers // Mar 2014

    Prediction of Quality Features in Iberian Ham by Applying Data Mining on Data From MRI and Computer Vision Techniques

    In this paper the authors aim to predict quality features of Iberian hams by using non-destructive methods of analysis and data mining. Iberian hams were analyzed by Magnetic Resonance Imaging (MRI) and Computer Vision Techniques (CVT) throughout their ripening process and physico-chemical parameters from them were also measured. The obtained...

    Provided By AIRCC

  • White Papers // Mar 2014

    Accurate Time Series Classification Using Shapelets

    Time series data are sequences of values measured over time. One of the most recent approaches to classification of time series data is to find shapelets within a data set. Time series shapelets are time series subsequences which represent a class. In order to compare two time series sequences, existing...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce

    Big data analysis has now become an integral part of many computational and statistical departments. Analysis of peta-byte scale of data is having an enhanced importance in the present day scenario. Big data manipulation is now considered as a key area of research in the field of data analytics and...

    Provided By AIRCC

  • White Papers // Feb 2014

    Security & Privacy Issues of Cloud & Grid Computing Networks

    Cloud computing is a new field in Internet computing that provides novel perspectives in internetworking technologies. Cloud computing has become a significant technology in field of information technology. Security of confidential data is a very important area of concern as it can make way for very big problems if unauthorized...

    Provided By AIRCC

  • White Papers // Feb 2014

    Different Applications of Programmable Logic Controller (PLC)

    Early Programming Logic Control (PLC) was designed to replace relay logic systems. These PLCs were programmed in \"Ladder Logic\", which strongly resembles a schematic diagram of relay logic. Programming logic control has several features like protection from the open area conditions such dust, heat and cold. PLC also has the...

    Provided By AIRCC

  • White Papers // Feb 2014

    Survey of Network Anomaly Detection Using Markov Chain

    Recently an internet threat has been increased. The authors' motive is detect the intrusion in the network in concise. The real time issue such as DoS attack in banking, companies, industries and organization have been increased significantly IDS has been used in both server and host side. The major challenge...

    Provided By AIRCC

  • White Papers // Feb 2014

    Comparison of Document Management Systems by Meta Modeling and Workforce Centric Tuning Measures

    Document management software are used widely for office paper management and related workflows. However, they have some differences from a flexibility perspective for the needs of workers. Moreover, they also differentiate in their underlying conceptual design. In this paper, a set (eight) of widely used document management systems are chosen...

    Provided By AIRCC

  • White Papers // Feb 2014

    A Spatial Data Model for Moving Object Databases

    Moving object databases will have significant role in geospatial information systems as they allow users to model continuous movements of entities in the databases and perform spatio-temporal analysis. For representing and querying moving objects, algebra with a comprehensive framework of user defined types together with a set of functions on...

    Provided By AIRCC

  • White Papers // Feb 2014

    Methodological Study of Opinion Mining and Sentiment Analysis Techniques

    Decision making both on individual and organizational level is always accompanied by the search of other's opinion on the same. With tremendous establishment of opinion rich resources like, reviews, forum discussions, blogs, micro-blogs, Twitter etc. provide a rich anthology of sentiments. This user generated content can serve as a benefaction...

    Provided By AIRCC

  • White Papers // Feb 2014

    Developing a New Architecture to Improve ITSM on Cloud Computing Environment

    Cloud computing is the fundamental change in technology at the moment. According to its many advantages such as on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service. Most organization are moved toward the cloud computing, since this environment is conceived service-oriented and many IT services...

    Provided By AIRCC

  • White Papers // Jan 2014

    A Novel Steganographic Scheme Based on Hash Function Coupled With AES Encryption

    In the present scenario, the use of images increased extremely in the cyber world so that the authors can easily transfer data with the help of these images in a secured way. Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused...

    Provided By AIRCC

  • White Papers // Jan 2014

    Cloud Computing and Security Issues in the Cloud

    Cloud computing has formed the conceptual and infrastructural basis for tomorrow's computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing...

    Provided By AIRCC

  • White Papers // Jan 2014

    Building a Collective-Experience Engine for Experience-Transfer Amongst Web Users

    The Web has had several evolutions of knowledge-expertise expression on the Web. In this paper the authors describe the Collective Experience Engine (CEE), a system for indexing experiential-knowledge about Web knowledge-sources (websites), and performing relative-experience calculations between participants of the CEE. The CEE provides an in-browser interface to query the...

    Provided By AIRCC

  • White Papers // Jan 2014

    Generating Data Warehouse Schema

    A data warehouse is an integrated set of data, derived basically from operational data to use in decision making strategy and business intelligence using OnLine Analytical Processing (OLAP) techniques. Most of the creation of data multidimensional data warehouses is done manually, but it is a very complex and takes a...

    Provided By AIRCC

  • White Papers // Dec 2013

    New Approaches With Chord in Efficient P2P Grid Resource Discovery

    Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows the users' to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports...

    Provided By AIRCC

  • White Papers // Dec 2013

    Front End Data Cleaning And Transformation In Standard Printed Form Using Neural Models

    Front end of data collection and loading into database manually may cause potential errors in data sets and a very time consuming process. Scanning of a data document in the form of an image and recognition of corresponding information in that image can be considered as a possible solution of...

    Provided By AIRCC

  • White Papers // Dec 2013

    Ontology Driven Knowledge Map for Enhancing Business Process Reengineering

    It has been a constant human desire to be dissatisfied with the status quo as there is always need to improve upon the way business is being done. As a result, business process reengineering is introduced into organization in order to overcome these challenges of inefficiencies and high running cost....

    Provided By AIRCC

  • White Papers // Dec 2013

    A Proficient 5C Approach to Boost The Security in the SaaS Model's Technical Architectural Components

    For anything that involves delivering hosted services over the internet is cloud computing. These services are classified as: IaaS, SaaS and PaaS. This paper focuses on SaaS security measures. SaaS is a cloud based productivity suite that helps the business people to connect and work from anywhere on any device....

    Provided By AIRCC

  • White Papers // Dec 2013

    Score Based Deadline Constrained Workflow Scheduling Algorithm for Cloud Systems

    Cloud computing is the latest and emerging trend in information technology domain. It offers utility-based IT services to user over the Internet. Workflow scheduling is one of the major problems in cloud systems. A good scheduling algorithm must minimize the execution time and cost of workflow application along with QoS...

    Provided By AIRCC

  • White Papers // Nov 2013

    Novel Text Categorization by Amalgamation of Augmented K-Nearest Neighbourhoodclassification and K-Medoids Clustering

    Machine learning for text classification is the underpinning of document cataloging, news filtering, document steering and exemplification. In text mining realm, effective feature selection is significant to make the learning task more accurate and competent. One of the traditional lazy text classifier k-Nearest Neighborhood (kNN) has a major pitfall in...

    Provided By AIRCC

  • White Papers // Nov 2013

    Analysis & Prediction of Sales Data in Sap-ERP System Using Clustering Algorithms

    Clustering is an important data mining technique where the authors will be interested in maximizing intra-cluster distance and also minimizing inter-cluster distance. They have utilized clustering techniques for detecting deviation in product sales and also to identify and compare sales over a particular period of time. Clustering is suited to...

    Provided By AIRCC

  • White Papers // Nov 2013

    Cloud Computing Technology for Egovernment Architecture

    The evolution of cloud computing has had a significant effect on the people lives and it has brought many benefits. Cloud computing is a style of computing which is formed from the aggregation and development of technologies such as grid computing distributed computing, parallel computing and service-oriented architecture and its...

    Provided By AIRCC

  • White Papers // Nov 2013

    Improving Data Transmission in the Vanet Using Multi-Criteria Decision Making Method Based on Fuzzy Logic

    In vehicular ad-hoc networks the packets are sent using multi-hop methods and the receiving limit of a message is gradually extended, but the exponential increment of the number of nodes re-broadcasting a message results in broadcast storm problem in data broadcasting in this case. Some characteristics like high speed of...

    Provided By AIRCC

  • White Papers // Nov 2013

    Behavioural Biometrics and Cognitive Security Authentication Comparison Study

    Behavioral biometrics is a scientific study with the primary purpose of identifying the authenticity of a user based on the way they interact with an authentication mechanism. While association based password authentication is a cognitive model of authentication system. The work done shows the implementation of keyboard latency technique for...

    Provided By AIRCC

  • White Papers // Oct 2013

    Survey on Caching and Replication Algorithm for Content Distribution in Peer to Peer Networks

    In this paper, the authors focus on caching and replication algorithm for content distribution in peer to peer networks. Caching and replication is a key strategy for improve the reliability, availability, and performance in peer to peer networks. This paper gives a brief introduction to caching, replication and various algorithms...

    Provided By AIRCC

  • White Papers // Oct 2013

    Network Traffic Adaptation for Cloud Games

    With the arrival of cloud technology, game accessibility and ubiquity have a bright future; games can be hosted in a centralize server and accessed through the Internet by a thin client on a wide variety of devices with modest capabilities: cloud gaming. However, current cloud gaming systems have very strong...

    Provided By AIRCC

  • White Papers // Oct 2013

    A Security Model for Cloud Computing Based on Autonomous Biological Agents

    Besides many advantages which cloud computing create, there are different concerns such as security. In this paper, the conceptual model based on Biological Immune System (BIS) will be proposed in order to create security in cloud computing. BIS have several features such as distributed computing, self organizing, self-learning that are...

    Provided By AIRCC

  • White Papers // Oct 2013

    Cloud Computing Performance Evaluation: Issues and Challenges

    Cloud computing makes the dream of computing real as a tool and in the form of service. This internet - based on-going technology which has brought flexibility, capacity and power of processing has realized service-oriented idea and has created a new ecosystem in the computing world with its great power...

    Provided By AIRCC

  • White Papers // Sep 2013

    Cloud Computing Challenges and Solutions

    Cloud computing is an emerging area of computer technology that benefits from the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet users requirements and applications. It can...

    Provided By AIRCC

  • White Papers // Sep 2013

    Predicting Students' Performance Using ID3 and C4.5 Classification Algorithms

    An educational institution needs to have an approximate prior knowledge of enrolled students to predict their performance in future academics. This helps them to identify promising students and also provides them an opportunity to pay attention to and improve those who would probably get lower grades. As a solution, the...

    Provided By AIRCC

  • White Papers // Sep 2013

    Column-Store Databases: Approaches and Optimization Techniques

    Database system storage technology is mainly composed by Column-Stores (CS) and Row-Stores (RS). Currently, the majority of popular database products use RS, i.e. to store each record's attributes together, such as Microsoft SQL Server, Oracle and so on. Column-Stores database stores data column-by-column. The need for Column-Stores database arose for...

    Provided By AIRCC

  • White Papers // Sep 2013

    Security Analysis of Generalized Confidentialmodulation for Quantum Communication

    The authors propose a new evaluation method for 'Generalized Confidential Modulation (GCM)' for quantum communication. Confidential modulation realizes a secret communication by using secret information for modulation and noise in a channel. Y-00 is one of the famous methods of GCM for quantum communication. The existing evaluation methods for GCM...

    Provided By AIRCC

  • White Papers // Sep 2013

    Visualize Network Anomaly Detection by Using K-Means Clustering Algorithm

    Network Intrusion Detection System (NIDS) is one that scans the network activities in a computer environment, and detects the intrusions or attacks. Then, the system administrator may be alerted to the take the corrective actions. With the ever increasing amount of new attacks in today's world the amount of data...

    Provided By AIRCC

  • White Papers // May 2010

    An Envision of Low Cost Mobile Adhoc Network Test Bed in a Laboratory Environment Emulating an Actual Manet

    Orchestrating a live field trial of wireless mobile networking involves significant cost and logistical issues relating to mobile platforms, support personnel, network and experiment automation and support equipment. The significant cost and logistics required to execute such a field trial can also be limiting in terms of achieving meaningful test...

    Provided By AIRCC

  • White Papers // Nov 2010

    A Survey on Data Warehouse Evolution

    The Data Warehouse (DW) technology was developed to integrate heterogeneous information sources for analysis purposes. Information sources are more and more autonomous and they often change their content due to perpetual transactions (data changes) and may change their structure due to continual users' requirements evolving (schema changes). Handling properly all...

    Provided By AIRCC

  • White Papers // Feb 2010

    Channel Allocation and Routing in Wireless Mesh Networks: A Survey and Qualitative Comparison Between Schemes

    In order to avoid transmission's collisions and improve network performances in Wireless Mesh Networks (WMNs), a reliable and efficient Medium Access Control (MAC) protocol and a good channel allocation are needed. Allowing multiple channels use in the same network is often presented as a possible way to improve the network...

    Provided By AIRCC

  • White Papers // Apr 2011

    SESSAMO: Session Mobility for Video Streaming Applications

    Nowadays, telecom operators are making a remarkable progress in providing a wide offer of broadband access to answer the high demand for high bit rate applications. Nevertheless, user requirements do not stop at providing high rate connection, but exceeds it to ensuring transparent service portability among his equipments. The user...

    Provided By AIRCC

  • White Papers // Dec 2010

    Data Mining Algorithms and Medical Sciences

    Extensive amounts of data stored in medical databases require the development of dedicated tools for accessing the data, data analysis, knowledge discovery, and effective use of sloretl knowledge and data. Widespread use of medical information systems and explosive enlargement of medical databases require conventional manual data analysis to be coupled...

    Provided By AIRCC

  • White Papers // Sep 2009

    A Collaborative PCE-Based Mechanism for E2E Recovery Within MPLS-Networks

    This paper suggests a new mechanism for inter domain recovery purpose within MPLS-based networks. This mechanism is based on efficient collaboration between several entities called PCE (Path Computation Element). The authors denote a PCE per domain. All PCEs should communicate in order to ensure propitious End-to-End failure handling, recovery and...

    Provided By AIRCC

  • White Papers // Apr 2011

    Application of PUF-Enabled RFID Tags in Electronic Banking

    Emerging e-banking capabilities such as automation, optimization of internal processes, access control to resources, costs reduction, increasing competitiveness and customer relationship management has encouraged many reputational financial organizations. One of the proposed technologies in e-banking is the application of RFID. RFID is an electronic tagging technology, which can provide a...

    Provided By AIRCC

  • White Papers // Feb 2011

    Selection Sorting Algorithm Visualization Using Flash

    This paper is intended to develop an algorithm visualization, particularly selection sorting for an Algorithm and Programming course. Algorithm visualization technology graphically illustrates how algorithms work. This visualization can be used to explain how all data move to the proper position in order to be sorted in a display computer...

    Provided By AIRCC

  • White Papers // Jul 2010

    Cross-Layer Resource Allocation Scheme Under Heterogeneous Constraints for Next Generation High Rate WPAN

    In the next generation wireless networks, the growing demand for new wireless applications is accompanied with high expectations for better Quality of Service (QoS) fulfillment especially for multimedia applications. Furthermore, the coexistence of future unlicensed users with existing licensed users is becoming a challenging task in the next generation communication...

    Provided By AIRCC

  • White Papers // Oct 2009

    A Security Framework for SOA Applications in Mobile Environment

    A Rapid evolution of mobile technologies has led to the development of more sophisticated mobile devices with better storage, processing and transmission power. These factors enable support to many types of application but also give rise to a necessity to find a model of service development. Actually, SOA (Service Oriented...

    Provided By AIRCC

  • White Papers // Oct 2009

    Integrating Identity-Based Cryptography in IMS Service Authentication

    Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so...

    Provided By AIRCC

  • White Papers // Sep 2010

    Meta-Learning in Grid-Based Data Mining Systems

    The Weka4GML framework has been designed to meet the requirements of distributed data mining. In this paper, the authors present the Weka4GML architecture based on WSRF technology for developing meta-learning methods to deal with datasets distributed among Data Grid. This framework extends the Weka toolkit to support distributed execution of...

    Provided By AIRCC

  • White Papers // Sep 2010

    A Reliable and Energy Efficient Transport Protocol for Wireless Sensor Networks

    In Wireless Sensor Networks (WSN), an ideal transport layer needs to support reliable message delivery and provide congestion control in an efficient manner in order to extend the lifetime of a WSN. The main use of transport protocol in WSN is to overcome the congestion and the reliability with energy...

    Provided By AIRCC

  • White Papers // Oct 2009

    K-Connection Maintenance Algorithm for Balanced Routing in Mobile Ad Hoc Networks

    In this paper the authors propose a connection balanced routing in Mobile Ad-hoc NETworks (MANETs) using backbone update messages. Virtual-Backbone (VB) construction is very familiar, to overcome broadcast storm problem in wireless networks. In real time, during the movement of nodes in MANET, more number of nodes added in a...

    Provided By AIRCC

  • White Papers // Oct 2009

    PSNR Evaluation of Media Traffic Over TFRC

    Due to the remarkable increase in media traffic over the existing best-effort IP Internet, the Internet congestion state is expected to worsen. TCP-friendly rate control protocol TFRC is one of the most promising congestion control techniques developed so far. Those techniques have been thoroughly tested in terms of being TCP-friendly...

    Provided By AIRCC

  • White Papers // Sep 2010

    Efficient Knowledge Base Management in DCSP

    DCSP (Distributed Constraint Satisfaction Problem) has been a very important research area in AI (Artificial Intelligence). There are many application problems in distributed AI that can be formalized as DSCPs. With the increasing complexity and problem size of the application problems in AI, the required storage place in searching and...

    Provided By AIRCC

  • White Papers // Feb 2011

    Machine Learning Methods for Spam E-Mail Classification

    The increasing volume of unsolicited bulk e-mail (also known as spam) has generated a need for reliable anti-spam filters. Machine learning techniques now days used to automatically filter the spam e-mail in a very successful rate. In this paper the authors review some of the most popular machine learning methods...

    Provided By AIRCC

  • White Papers // Apr 2010

    An Optimized Distributed Association Rule Mining Algorithm in Parallel and Distributed Data Mining With XML Data for Improved Response Time

    Many current data mining tasks can be accomplished successfully only in a distributed setting. The field of distributed data mining has therefore gained increasing importance in the last decade. The Apriori algorithm by Rakesh Agarwal has emerged as one of the best Association Rule mining algorithms. It also serves as...

    Provided By AIRCC

  • White Papers // Jun 2010

    Interoperability, Trust Based Information Sharing Protocol and Security: Digital Government Key Issues

    Improved interoperability between public and private organizations is of key significance to make digital government newest triumphant. Digital Government interoperability, information sharing protocol and security are measured the key issue for achieving a refined stage of digital government. Flawless interoperability is essential to share the information between diverse and merely...

    Provided By AIRCC

  • White Papers // Nov 2010

    An Adaptive P2P Topology Evolvement Model Based on Interest Similarity

    To improve the resource location efficiency and guarantee resource download quality of nodes in P2P systems, the authors propose a node Interest bias based P2P Interest domain partition mechanism, give the concept of Interest similarity as well as its computation method, and then present an adaptive P2P topology evolvement model...

    Provided By AIRCC

  • White Papers // Nov 2010

    Network State Classification Based on the Statistical Properties of RTT for an Adaptive Multi-State Proactive Transport Protocol for Satellite Based Networks

    This paper attempts to establish the fact that Multi State Network Classification is essential for performance enhancement of Transport protocols over Satellite based Networks. A model to classify Multi State network condition taking into consideration both congestion and channel error is evolved. In order to arrive at such a model...

    Provided By AIRCC

  • White Papers // Nov 2010

    Ber Performance Evaluation of Two Types of Antenna Array-Based Receivers in a Multipath Channel

    Smart antenna systems have received much attention in the last few years because they can increase system capacity by dynamically tuning out interference while focusing on the intended user. In this paper, the authors focused the research on the performance of two kinds of smart antenna receivers. An analytical model...

    Provided By AIRCC

  • White Papers // Jun 2010

    Breaking the Legend: Maxmin Fairness Notion Is No Longer Effective

    In this paper the authors analytically propose an alternative approach to achieve better fairness in scheduling mechanisms which could provide better quality of service particularly for real time application. The proposal oppose the allocation of the bandwidth which adopted by all previous scheduling mechanism. It rather adopt the opposition to...

    Provided By AIRCC

  • White Papers // Nov 2010

    An Implementation Possibilities for AODV Routing Protocol in Real World

    Most of the adhoc routing protocol research work has been done using simulation only because of the difficulty of creating real implementation. In simulation the developer controls the whole system, which is in effect only a single component. An Implementation, on the other hand, needs to interoperate with a large...

    Provided By AIRCC

  • White Papers // Apr 2011

    Framework for Evolving Software Product Line

    Software product line engineering is an approach that develops and maintains families of products while taking advantage of their common aspects and predicted variabilities. Indeed, Software Product Lines (SPL) are an important means for implementing software variability which is the ability of a system to be efficiently extended, changed, customized...

    Provided By AIRCC

  • White Papers // Nov 2010

    Towards an Incremental Maintenance of Cyclic Association Rules

    Recently, the cyclic association rules have been introduced in order to discover rules from items characterized by their regular variation over time. In real life situations, temporal databases are often appended or updated. Rescanning the whole database every time is highly expensive while existing incremental mining techniques can efficiently solve...

    Provided By AIRCC

  • White Papers // Feb 2011

    Reduce Threats in Competitive Intelligence System: A Generic Information Fusion Access Control Model

    Information fusion is a cornerstone of competitive intelligence activity that aims at supporting decision making by collecting, analyzing and disseminating information. This information comes from heterogeneous data sources. In this paper the authors present an approach of access control. This approach is focused both on the information that must be...

    Provided By AIRCC

  • White Papers // Sep 2010

    CR-Mac: A Multichannel Mac Protocol for Cognitive Radio Ad Hoc Networks

    This paper proposes a cross-layer based cognitive radio multichannel Medium Access Control (MAC) protocol with TDMA, which integrate the spectrum sensing at PHYsical (PHY) layer and the packet scheduling at MAC layer, for the ad hoc wireless networks. The IEEE 802.11 standard allows for the use of multiple channels available...

    Provided By AIRCC

  • White Papers // Feb 2011

    Fine Synchronization Through UWB TH-PPM Impulse Radios

    In this paper, a novel fine timing algorithm has been tested and developed to synchronize Ultra-WideBand (UWB) signals with Pulse Position Modulation (PPM). By applying this algorithm, the authors evaluate timing algorithms in both Data-Aided (DA) and Non-Data-Aided (NDA) modes. Based on correlation operations, the algorithm remains operational in practical...

    Provided By AIRCC

  • White Papers // Nov 2010

    ADHOCFTSIM: A Simulator of Fault Tolerance in the Ad-Hoc Networks

    The flexibility and diversity of Wireless Mobile Networks offer many opportunities that are not always taken into account by existing distributed systems. In particular, the proliferation of mobile users and the use of mobile Ad-Hoc promote the formation of collaborative groups to share resources. The authors propose a solution for...

    Provided By AIRCC

  • White Papers // Feb 2011

    Performance of MC-MC CDMA Systems With Nonlinear Models of HPA

    A new wireless communication system denoted as Multi-Code Multi-Carrier CDMA (MC-MC CDMA), which is the combination of Multi-Code CDMA and Multi-Carrier CDMA, is analyzed in this paper. This system can satisfy multi-rate services using multi-code schemes and muti-carrier services used for high rate transmission. The system is evaluated using Traveling...

    Provided By AIRCC

  • White Papers // Apr 2011

    Impact of Limited Feedback on MIMO-OFDM Systems Using Joint Beamforming

    In multi input multi output antenna systems, beamforming is a technique for guarding against the negative effects of fading. However, this technique requires the transmitter to have perfect knowledge of the channel which is often not available a priori. A solution to overcome this problem is to design the beamforming...

    Provided By AIRCC

  • White Papers // Apr 2011

    Multi-Criteria Vertical Handover for Heterogonous Networks

    In the next generation heterogeneous wireless networks, a user with a multi-interface terminal may have network access from different service providers using various technologies. Vertical HandOver (VHO) is the capability to switch on-going connections from one Radio Access Network (RAN) to another. This switching is based on the discovered accesses,...

    Provided By AIRCC

  • White Papers // Apr 2011

    Implementation of Channel Estimation and Modulation Technique for MIMO System

    Future wireless communication system have to be designed to integrate features such as high data rates, high quality of service and multimedia in the existing communication framework. Increased demand in wireless communication system has led to demand for higher network capacity and performance. Higher bandwidth, optimized modulation offer practically limited...

    Provided By AIRCC

  • White Papers // Sep 2010

    Comparison of Different Fingerprint Compression Techniques

    The important features of wavelet transform and different methods in compression of fingerprint images have been implemented. Image quality is measured objectively using Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE).A comparative study using discrete cosine transform based Joint Photographic Experts Group(JPEG) standard, wavelet based basic Set...

    Provided By AIRCC

  • White Papers // Sep 2010

    Business Rule Management Framework for N-Tier E-Business Applications

    Business rules have attained a major role in the development of software systems for businesses. They influence the business behavior based on the decisions enforced upon a wide range of aspects. As the business requirements are subjected to frequent amendments, new business rules have to be evolved to reinstate the...

    Provided By AIRCC

  • White Papers // Dec 2010

    A Survey Instrument for Identification of the Critical Failure Factors in the Failure of ERP Implementation at Indian SMEs

    Many quantitative and qualitative studies have been conducted in various countries for the Enterprise Resource Planning (ERP) implementation in the Large Enterprise (LEs) as well as for Small and Medium-size Enterprises (SMEs) to capture the full benefits of ERP systems; still there is a lack of survey instrument for identification...

    Provided By AIRCC

  • White Papers // Dec 2009

    Adaptive Routing Algorithm for MANET: Termite

    Mobile Ad hoc network consists of a set of mobile nodes. This network does not have any infrastructure or central administration, hence it is called infrastructure less network. As the nodes are mobile, it is very difficult to find the path between two end points. This paper presents a solution...

    Provided By AIRCC

  • White Papers // May 2011

    Credential Based Mediator Architecture for Access Control and Data Integration in Multiple Data Sources Environment

    In multiple data sources environment where open access is to be provided to the users not known to the system, the credential based access control has emerged as a suitable approach for achieving security on shared data. Mediation techniques have been developed for data integration that provide a single unified...

    Provided By AIRCC

  • White Papers // May 2011

    Maintaining Uniform Density and Minimizing the Chance of Error in a Large Scale WSN

    In a real application area, the WSN is not a homogeneous network where the nodes are maintained in respective coordinate position relatively same to each other. But rather homogeneous it should be heterogeneous, where the relative positional difference for different nodes are different. In this paper a better scheme is...

    Provided By AIRCC